Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63406: n/a

0
High
VulnerabilityCVE-2025-63406cvecve-2025-63406
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Intermesh BV GroupOffice vulnerable before v.25.0.47 and 6.8.136 allows a remote attacker to execute arbitrary code via the dbToApi() and eval() in the FunctionField.php

AI-Powered Analysis

AILast updated: 11/20/2025, 20:13:39 UTC

Technical Analysis

CVE-2025-63406 is a remote code execution vulnerability identified in Intermesh BV's GroupOffice collaboration software, affecting versions prior to 25.0.47 and 6.8.136. The root cause is the unsafe use of the PHP eval() function within the dbToApi() method in FunctionField.php, which processes database input without sufficient sanitization. This leads to command injection opportunities, allowing an attacker with low privileges (PR:L) but no user interaction (UI:N) to execute arbitrary code remotely over the network (AV:N). The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's characteristics suggest it could be exploited with relative ease by attackers who have authenticated access, potentially leading to full system compromise. GroupOffice is widely used in enterprise environments for email, collaboration, and document management, making this vulnerability critical for organizations relying on it. The lack of patches at the time of disclosure emphasizes the need for rapid remediation once updates are available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to sensitive data confidentiality, system integrity, and service availability. Exploitation could lead to unauthorized data access, data manipulation, or complete takeover of affected GroupOffice servers. This is particularly concerning for sectors handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. Disruption of collaboration and communication services could impair business operations, especially in organizations heavily dependent on GroupOffice for daily workflows. The requirement for low privilege authenticated access means insider threats or compromised credentials could be leveraged by attackers. The absence of known exploits currently provides a limited window for proactive defense, but the high severity score indicates that exploitation could have widespread and severe consequences across European enterprises using this software.

Mitigation Recommendations

Organizations should immediately plan and execute upgrades to GroupOffice versions 25.0.47 or 6.8.136 once available, as these contain fixes for the vulnerability. Until patches are applied, restrict access to GroupOffice instances by implementing network segmentation and firewall rules limiting connections to trusted IPs. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Conduct thorough audits of user privileges to ensure minimal necessary access is granted, mitigating the risk from low-privilege attackers. Monitor logs for unusual activity related to the dbToApi() function or unexpected code execution attempts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting eval() usage. Educate administrators and users about the risks and signs of exploitation. Finally, maintain regular backups and test restoration procedures to ensure resilience against potential ransomware or destructive attacks stemming from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69162e9f19431ce75c5ca19a

Added to database: 11/13/2025, 7:16:47 PM

Last enriched: 11/20/2025, 8:13:39 PM

Last updated: 12/29/2025, 10:35:42 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats