CVE-2026-25511: CWE-918: Server-Side Request Forgery (SSRF) in Intermesh groupoffice
CVE-2026-25511 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Intermesh's Group-Office versions prior to 6. 8. 150, 25. 0. 82, and 26. 0. 5. An authenticated user with System Administrator privileges can exploit the WOPI service discovery URL to perform SSRF attacks, including accessing internal hosts and ports. The vulnerability allows exfiltration of SSRF response data via the built-in debug system, effectively making the SSRF visible and enabling full server-side file reads. No user interaction is required beyond authentication, and the vulnerability has a CVSS 4.
AI Analysis
Technical Summary
CVE-2026-25511 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, discovered in Intermesh's Group-Office enterprise CRM and groupware tool. The vulnerability exists in versions prior to 6.8.150, 25.0.82, and 26.0.5. It allows an authenticated user with System Administrator privileges to exploit the WOPI service discovery URL to send crafted requests from the server to internal network hosts and ports that are normally inaccessible externally. The SSRF can be leveraged to access sensitive internal services, potentially bypassing network segmentation and firewall rules. Additionally, the SSRF response body can be exfiltrated through the built-in debug system, effectively turning a blind SSRF into a visible one, which significantly increases the attacker's ability to gather information. This visibility also enables full server-side file read capabilities, which can lead to disclosure of sensitive files and credentials stored on the server. The vulnerability requires no user interaction beyond authentication and has a CVSS 4.0 score of 8.2, reflecting high impact on confidentiality and integrity with low attack complexity. The flaw has been addressed in the specified patched versions. No public exploits have been reported yet, but the potential for severe impact exists if exploited. The vulnerability highlights the risks of SSRF in administrative interfaces and the importance of strict access controls and input validation in enterprise collaboration software.
Potential Impact
For European organizations, the impact of CVE-2026-25511 can be significant. Exploitation allows attackers with System Administrator credentials to bypass internal network protections and access sensitive internal services and data, potentially leading to data breaches, lateral movement, and compromise of critical infrastructure. The ability to read server-side files can expose configuration files, credentials, and other sensitive information, increasing the risk of further exploitation. Organizations relying on Group-Office for CRM and groupware functions may face operational disruptions and data confidentiality breaches. Given the high CVSS score and the administrative level required, the threat is particularly concerning for enterprises with complex internal networks and valuable internal resources. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if credentials are compromised or insider threats exist.
Mitigation Recommendations
1. Immediately upgrade Group-Office installations to versions 6.8.150, 25.0.82, or 26.0.5 or later to apply the official patches addressing this SSRF vulnerability. 2. Restrict System Administrator group membership strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Disable or restrict access to the WOPI service discovery URL if it is not required for business operations. 4. Implement network segmentation and firewall rules to limit the server's ability to make arbitrary outbound requests to internal hosts and ports, reducing the SSRF attack surface. 5. Monitor logs and debug outputs for unusual or unexpected requests that may indicate SSRF exploitation attempts. 6. Conduct regular security audits and penetration testing focusing on SSRF and internal service exposure. 7. Educate administrators on the risks of SSRF and the importance of applying security patches promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2026-25511: CWE-918: Server-Side Request Forgery (SSRF) in Intermesh groupoffice
Description
CVE-2026-25511 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Intermesh's Group-Office versions prior to 6. 8. 150, 25. 0. 82, and 26. 0. 5. An authenticated user with System Administrator privileges can exploit the WOPI service discovery URL to perform SSRF attacks, including accessing internal hosts and ports. The vulnerability allows exfiltration of SSRF response data via the built-in debug system, effectively making the SSRF visible and enabling full server-side file reads. No user interaction is required beyond authentication, and the vulnerability has a CVSS 4.
AI-Powered Analysis
Technical Analysis
CVE-2026-25511 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, discovered in Intermesh's Group-Office enterprise CRM and groupware tool. The vulnerability exists in versions prior to 6.8.150, 25.0.82, and 26.0.5. It allows an authenticated user with System Administrator privileges to exploit the WOPI service discovery URL to send crafted requests from the server to internal network hosts and ports that are normally inaccessible externally. The SSRF can be leveraged to access sensitive internal services, potentially bypassing network segmentation and firewall rules. Additionally, the SSRF response body can be exfiltrated through the built-in debug system, effectively turning a blind SSRF into a visible one, which significantly increases the attacker's ability to gather information. This visibility also enables full server-side file read capabilities, which can lead to disclosure of sensitive files and credentials stored on the server. The vulnerability requires no user interaction beyond authentication and has a CVSS 4.0 score of 8.2, reflecting high impact on confidentiality and integrity with low attack complexity. The flaw has been addressed in the specified patched versions. No public exploits have been reported yet, but the potential for severe impact exists if exploited. The vulnerability highlights the risks of SSRF in administrative interfaces and the importance of strict access controls and input validation in enterprise collaboration software.
Potential Impact
For European organizations, the impact of CVE-2026-25511 can be significant. Exploitation allows attackers with System Administrator credentials to bypass internal network protections and access sensitive internal services and data, potentially leading to data breaches, lateral movement, and compromise of critical infrastructure. The ability to read server-side files can expose configuration files, credentials, and other sensitive information, increasing the risk of further exploitation. Organizations relying on Group-Office for CRM and groupware functions may face operational disruptions and data confidentiality breaches. Given the high CVSS score and the administrative level required, the threat is particularly concerning for enterprises with complex internal networks and valuable internal resources. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if credentials are compromised or insider threats exist.
Mitigation Recommendations
1. Immediately upgrade Group-Office installations to versions 6.8.150, 25.0.82, or 26.0.5 or later to apply the official patches addressing this SSRF vulnerability. 2. Restrict System Administrator group membership strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Disable or restrict access to the WOPI service discovery URL if it is not required for business operations. 4. Implement network segmentation and firewall rules to limit the server's ability to make arbitrary outbound requests to internal hosts and ports, reducing the SSRF attack surface. 5. Monitor logs and debug outputs for unusual or unexpected requests that may indicate SSRF exploitation attempts. 6. Conduct regular security audits and penetration testing focusing on SSRF and internal service exposure. 7. Educate administrators on the risks of SSRF and the importance of applying security patches promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T18:21:42.486Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983afd6f9fa50a62fabdb3e
Added to database: 2/4/2026, 8:45:10 PM
Last enriched: 2/4/2026, 8:59:46 PM
Last updated: 2/5/2026, 12:52:19 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2026-1895: Improper Access Controls in WeKan
MediumCVE-2025-22873: CWE-23: Relative Path Traversal in Go standard library os
MediumCVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.