Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25511: CWE-918: Server-Side Request Forgery (SSRF) in Intermesh groupoffice

0
High
VulnerabilityCVE-2026-25511cvecve-2026-25511cwe-918
Published: Wed Feb 04 2026 (02/04/2026, 20:40:04 UTC)
Source: CVE Database V5
Vendor/Project: Intermesh
Product: groupoffice

Description

CVE-2026-25511 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Intermesh's Group-Office versions prior to 6. 8. 150, 25. 0. 82, and 26. 0. 5. An authenticated user with System Administrator privileges can exploit the WOPI service discovery URL to perform SSRF attacks, including accessing internal hosts and ports. The vulnerability allows exfiltration of SSRF response data via the built-in debug system, effectively making the SSRF visible and enabling full server-side file reads. No user interaction is required beyond authentication, and the vulnerability has a CVSS 4.

AI-Powered Analysis

AILast updated: 02/04/2026, 20:59:46 UTC

Technical Analysis

CVE-2026-25511 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, discovered in Intermesh's Group-Office enterprise CRM and groupware tool. The vulnerability exists in versions prior to 6.8.150, 25.0.82, and 26.0.5. It allows an authenticated user with System Administrator privileges to exploit the WOPI service discovery URL to send crafted requests from the server to internal network hosts and ports that are normally inaccessible externally. The SSRF can be leveraged to access sensitive internal services, potentially bypassing network segmentation and firewall rules. Additionally, the SSRF response body can be exfiltrated through the built-in debug system, effectively turning a blind SSRF into a visible one, which significantly increases the attacker's ability to gather information. This visibility also enables full server-side file read capabilities, which can lead to disclosure of sensitive files and credentials stored on the server. The vulnerability requires no user interaction beyond authentication and has a CVSS 4.0 score of 8.2, reflecting high impact on confidentiality and integrity with low attack complexity. The flaw has been addressed in the specified patched versions. No public exploits have been reported yet, but the potential for severe impact exists if exploited. The vulnerability highlights the risks of SSRF in administrative interfaces and the importance of strict access controls and input validation in enterprise collaboration software.

Potential Impact

For European organizations, the impact of CVE-2026-25511 can be significant. Exploitation allows attackers with System Administrator credentials to bypass internal network protections and access sensitive internal services and data, potentially leading to data breaches, lateral movement, and compromise of critical infrastructure. The ability to read server-side files can expose configuration files, credentials, and other sensitive information, increasing the risk of further exploitation. Organizations relying on Group-Office for CRM and groupware functions may face operational disruptions and data confidentiality breaches. Given the high CVSS score and the administrative level required, the threat is particularly concerning for enterprises with complex internal networks and valuable internal resources. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if credentials are compromised or insider threats exist.

Mitigation Recommendations

1. Immediately upgrade Group-Office installations to versions 6.8.150, 25.0.82, or 26.0.5 or later to apply the official patches addressing this SSRF vulnerability. 2. Restrict System Administrator group membership strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Disable or restrict access to the WOPI service discovery URL if it is not required for business operations. 4. Implement network segmentation and firewall rules to limit the server's ability to make arbitrary outbound requests to internal hosts and ports, reducing the SSRF attack surface. 5. Monitor logs and debug outputs for unusual or unexpected requests that may indicate SSRF exploitation attempts. 6. Conduct regular security audits and penetration testing focusing on SSRF and internal service exposure. 7. Educate administrators on the risks of SSRF and the importance of applying security patches promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.486Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983afd6f9fa50a62fabdb3e

Added to database: 2/4/2026, 8:45:10 PM

Last enriched: 2/4/2026, 8:59:46 PM

Last updated: 2/5/2026, 12:52:19 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats