Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a DOM-based Cross-Site Scripting (XSS) vulnerability exists in the GroupOffice application, allowing attackers to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability can be triggered by injecting a crafted payload into a parameter that is later processed unsafely in the DOM. Versions 6.8.119 and 25.0.20 contain a fix for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 30 May 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intermesh
Intermesh group-office |
|
| CPEs | cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Intermesh
Intermesh group-office |
|
| Metrics |
cvssV3_1
|
Thu, 22 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 May 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a DOM-based Cross-Site Scripting (XSS) vulnerability exists in the GroupOffice application, allowing attackers to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability can be triggered by injecting a crafted payload into a parameter that is later processed unsafely in the DOM. Versions 6.8.119 and 25.0.20 contain a fix for the issue. | |
| Title | GroupOffice's DOM-Based XSS in all Date Input Fields Allows Arbitrary JavaScript Execution | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-22T17:52:08.245Z
Reserved: 2025-05-19T15:46:00.394Z
Link: CVE-2025-48368
Updated: 2025-05-22T17:41:40.928Z
Status : Analyzed
Published: 2025-05-22T18:15:43.630
Modified: 2025-05-30T01:17:44.430
Link: CVE-2025-48368
No data.