CVE-2025-48366: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Intermesh groupoffice
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a stored and blind XSS vulnerability exists in the Phone Number field of the user profile within the GroupOffice application. This allows a malicious actor to inject persistent JavaScript payloads, which are triggered in the context of another user when they view the Address Book. Successful exploitation enables actions such as forced redirects, unauthorized fetch requests, or other arbitrary JavaScript execution without user interaction. Versions 6.8.119 and 25.0.20 contain a fix for the issue.
AI Analysis
Technical Summary
CVE-2025-48366 is a stored and blind Cross-Site Scripting (XSS) vulnerability affecting the Group-Office application developed by Intermesh, which is an enterprise customer relationship management (CRM) and groupware tool. The vulnerability exists in versions prior to 6.8.119 and 25.0.20. Specifically, the flaw is located in the Phone Number field of the user profile. An attacker can inject persistent malicious JavaScript payloads into this field. When another user views the Address Book, the injected script executes in their browser context without requiring any user interaction. This allows the attacker to perform unauthorized actions such as forced redirects to malicious sites, unauthorized fetch requests that could exfiltrate data or perform actions on behalf of the victim, and other arbitrary JavaScript execution. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation, i.e., Cross-site Scripting) and CWE-87. The CVSS 4.0 base score is 6.9 (medium severity), reflecting a network attack vector with low attack complexity, no privileges or user interaction required, but with high scope and impact on confidentiality, integrity, and availability. The vulnerability has not been observed exploited in the wild yet. The issue is fixed in versions 6.8.119 and 25.0.20 of Group-Office. This vulnerability is significant because it allows attackers to compromise user sessions, steal sensitive information, or manipulate application behavior within enterprise environments using Group-Office, potentially leading to broader network compromise or data breaches.
Potential Impact
For European organizations using Group-Office, this vulnerability presents a notable risk to confidentiality and integrity of internal communications and data. Since Group-Office is used for CRM and groupware functions, exploitation could lead to unauthorized access to sensitive customer data, internal contacts, and scheduling information. The stored XSS can be used to hijack user sessions, perform actions on behalf of users, or spread malware within the organization’s network. This could disrupt business operations, damage customer trust, and lead to regulatory non-compliance, especially under GDPR, which mandates protection of personal data. The lack of required user interaction and privileges makes the vulnerability easier to exploit remotely, increasing the risk of widespread impact in organizations with multiple users accessing the Address Book. Additionally, the high scope means that the vulnerability can affect multiple users once exploited. European organizations with extensive use of Group-Office for collaboration and customer management are particularly at risk of data leakage, unauthorized data manipulation, and potential lateral movement by attackers.
Mitigation Recommendations
Organizations should immediately upgrade Group-Office to versions 6.8.119 or 25.0.20 or later to apply the official patch that addresses this XSS vulnerability. Until patching is possible, administrators should implement strict input validation and sanitization on the Phone Number field to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing Group-Office. Additionally, enable HTTP-only and secure flags on session cookies to reduce the risk of session hijacking. Conduct regular security audits and penetration testing focused on web application inputs and stored data fields. Educate users about the risks of unexpected redirects or unusual behavior when using the Address Book. Network segmentation and monitoring for unusual outbound requests from user browsers can help detect exploitation attempts. Finally, maintain up-to-date backups and incident response plans to quickly recover from any compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-48366: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Intermesh groupoffice
Description
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a stored and blind XSS vulnerability exists in the Phone Number field of the user profile within the GroupOffice application. This allows a malicious actor to inject persistent JavaScript payloads, which are triggered in the context of another user when they view the Address Book. Successful exploitation enables actions such as forced redirects, unauthorized fetch requests, or other arbitrary JavaScript execution without user interaction. Versions 6.8.119 and 25.0.20 contain a fix for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-48366 is a stored and blind Cross-Site Scripting (XSS) vulnerability affecting the Group-Office application developed by Intermesh, which is an enterprise customer relationship management (CRM) and groupware tool. The vulnerability exists in versions prior to 6.8.119 and 25.0.20. Specifically, the flaw is located in the Phone Number field of the user profile. An attacker can inject persistent malicious JavaScript payloads into this field. When another user views the Address Book, the injected script executes in their browser context without requiring any user interaction. This allows the attacker to perform unauthorized actions such as forced redirects to malicious sites, unauthorized fetch requests that could exfiltrate data or perform actions on behalf of the victim, and other arbitrary JavaScript execution. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation, i.e., Cross-site Scripting) and CWE-87. The CVSS 4.0 base score is 6.9 (medium severity), reflecting a network attack vector with low attack complexity, no privileges or user interaction required, but with high scope and impact on confidentiality, integrity, and availability. The vulnerability has not been observed exploited in the wild yet. The issue is fixed in versions 6.8.119 and 25.0.20 of Group-Office. This vulnerability is significant because it allows attackers to compromise user sessions, steal sensitive information, or manipulate application behavior within enterprise environments using Group-Office, potentially leading to broader network compromise or data breaches.
Potential Impact
For European organizations using Group-Office, this vulnerability presents a notable risk to confidentiality and integrity of internal communications and data. Since Group-Office is used for CRM and groupware functions, exploitation could lead to unauthorized access to sensitive customer data, internal contacts, and scheduling information. The stored XSS can be used to hijack user sessions, perform actions on behalf of users, or spread malware within the organization’s network. This could disrupt business operations, damage customer trust, and lead to regulatory non-compliance, especially under GDPR, which mandates protection of personal data. The lack of required user interaction and privileges makes the vulnerability easier to exploit remotely, increasing the risk of widespread impact in organizations with multiple users accessing the Address Book. Additionally, the high scope means that the vulnerability can affect multiple users once exploited. European organizations with extensive use of Group-Office for collaboration and customer management are particularly at risk of data leakage, unauthorized data manipulation, and potential lateral movement by attackers.
Mitigation Recommendations
Organizations should immediately upgrade Group-Office to versions 6.8.119 or 25.0.20 or later to apply the official patch that addresses this XSS vulnerability. Until patching is possible, administrators should implement strict input validation and sanitization on the Phone Number field to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing Group-Office. Additionally, enable HTTP-only and secure flags on session cookies to reduce the risk of session hijacking. Conduct regular security audits and penetration testing focused on web application inputs and stored data fields. Educate users about the risks of unexpected redirects or unusual behavior when using the Address Book. Network segmentation and monitoring for unusual outbound requests from user browsers can help detect exploitation attempts. Finally, maintain up-to-date backups and incident response plans to quickly recover from any compromise.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-19T15:46:00.394Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682f60d40acd01a249264434
Added to database: 5/22/2025, 5:37:24 PM
Last enriched: 7/8/2025, 8:41:50 AM
Last updated: 1/7/2026, 6:10:30 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.