Skip to main content

CVE-2025-48368: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Intermesh groupoffice

Medium
VulnerabilityCVE-2025-48368cvecve-2025-48368cwe-79
Published: Thu May 22 2025 (05/22/2025, 17:29:57 UTC)
Source: CVE
Vendor/Project: Intermesh
Product: groupoffice

Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a DOM-based Cross-Site Scripting (XSS) vulnerability exists in the GroupOffice application, allowing attackers to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability can be triggered by injecting a crafted payload into a parameter that is later processed unsafely in the DOM. Versions 6.8.119 and 25.0.20 contain a fix for the issue.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:42:01 UTC

Technical Analysis

CVE-2025-48368 is a DOM-based Cross-Site Scripting (XSS) vulnerability affecting the Intermesh GroupOffice application, an enterprise customer relationship management (CRM) and groupware tool. The vulnerability exists in versions prior to 6.8.119 and 25.0.20. It arises from improper neutralization of input during web page generation, specifically when user-supplied data is processed unsafely in the Document Object Model (DOM) without adequate sanitization or encoding. An attacker can craft a malicious payload injected into a parameter that the application later processes in the DOM context, enabling arbitrary JavaScript execution in the victim's browser. This can lead to session hijacking, allowing attackers to impersonate legitimate users, defacement of the web interface, or redirection to malicious websites that may host further exploits or phishing attempts. The vulnerability does not require authentication or privileges and can be triggered remotely via a crafted URL or input parameter, with only user interaction (clicking a link or visiting a malicious page) needed. The CVSS 4.0 base score is 5.8 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability has a high scope impact, meaning it can affect components beyond the vulnerable module. No known exploits are reported in the wild as of the publication date (May 22, 2025). The issue is addressed in GroupOffice versions 6.8.119 and 25.0.20 by implementing proper input neutralization and safe DOM handling to prevent script injection.

Potential Impact

For European organizations using GroupOffice as part of their CRM or groupware infrastructure, this vulnerability poses a significant risk to confidentiality and integrity of user sessions and data. Successful exploitation can lead to session hijacking, enabling attackers to access sensitive customer information, internal communications, or administrative functions. Defacement or redirection attacks can damage organizational reputation and trust, especially in sectors handling sensitive or regulated data such as finance, healthcare, or government. The medium severity score reflects that while exploitation requires user interaction, the lack of authentication barriers and network accessibility increase risk. Given GroupOffice’s role in collaboration and customer management, disruption or compromise could impact business continuity and regulatory compliance under GDPR if personal data is exposed. The absence of known exploits currently provides a window for mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should promptly upgrade GroupOffice installations to versions 6.8.119 or 25.0.20 or later to apply the official patch. Until upgrades are possible, implement strict Content Security Policy (CSP) headers to restrict the execution of inline scripts and untrusted sources, reducing the impact of DOM-based XSS. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting vulnerable parameters. Conduct thorough input validation and output encoding on all user-supplied data, especially parameters processed in the DOM. Educate users about the risks of clicking untrusted links and implement browser security features such as SameSite cookies and HttpOnly flags to mitigate session hijacking. Regularly audit and monitor logs for unusual activity indicative of exploitation attempts. Finally, consider isolating GroupOffice instances within segmented network zones to limit lateral movement if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-19T15:46:00.394Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f60d40acd01a249264436

Added to database: 5/22/2025, 5:37:24 PM

Last enriched: 7/8/2025, 8:42:01 AM

Last updated: 8/2/2025, 11:06:40 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats