CVE-2026-27947: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Intermesh groupoffice
Group-Office is an enterprise customer relationship management and groupware tool. Versions prior to 26.0.9, 25.0.87, and 6.8.154 have an authenticated Remote Code Execution vulnerability in the TNEF attachment processing flow. The vulnerable path extracts attacker-controlled files from `winmail.dat` and then invokes `zip` with a shell wildcard (`*`). Because extracted filenames are attacker-controlled, they can be interpreted as `zip` options and lead to arbitrary command execution. Versions 26.0.9, 25.0.87, and 6.8.154 fix the issue.
AI Analysis
Technical Summary
CVE-2026-27947 affects Intermesh Group-Office, an enterprise CRM and groupware solution, in versions before 26.0.9, 25.0.87, and 6.8.154. The vulnerability is rooted in improper neutralization of argument delimiters (CWE-88) during the processing of TNEF attachments, specifically winmail.dat files. When Group-Office extracts files from these attachments, it invokes the zip command with a shell wildcard (*) to handle the extracted files. Because the filenames are attacker-controlled and not properly sanitized, they can be interpreted as command-line options by the zip utility. This allows an authenticated attacker to inject arbitrary commands, resulting in remote code execution on the server hosting Group-Office. The vulnerability also relates to CWE-434 (Unrestricted Upload of File with Dangerous Type), as malicious files are uploaded and processed. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and privileges required but no additional authentication tokens. The vulnerability impacts confidentiality, integrity, and availability with high scope and impact. Although no exploits are publicly known, the critical severity and ease of exploitation given authenticated access make this a significant risk. The issue is resolved in the specified patched versions.
Potential Impact
This vulnerability allows an authenticated attacker to execute arbitrary commands on the Group-Office server, potentially leading to full system compromise. The attacker could steal sensitive CRM and groupware data, manipulate or delete information, disrupt service availability, or use the compromised server as a pivot point for further network intrusion. Given Group-Office’s role in managing enterprise communications and customer data, exploitation could result in significant data breaches, operational disruption, and reputational damage. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with weak credential management or exposed login interfaces. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, making this a critical threat for organizations relying on affected versions of Group-Office.
Mitigation Recommendations
Organizations should immediately upgrade Group-Office to versions 26.0.9, 25.0.87, or 6.8.154 or later to remediate this vulnerability. In addition to patching, administrators should enforce strong authentication policies, including multi-factor authentication, to reduce the risk of attacker access. Restrict access to the Group-Office interface to trusted networks or VPNs where possible. Monitor logs for unusual activity related to TNEF attachment processing or zip command execution. Disable or restrict the use of TNEF attachments if not required. Implement application-level input validation and sanitization for file uploads to prevent malicious filenames. Consider deploying host-based intrusion detection systems to detect anomalous command executions. Regularly audit user accounts and permissions to minimize the number of users with access to vulnerable functionality. Finally, maintain up-to-date backups to recover from potential compromise.
Affected Countries
United States, Germany, United Kingdom, France, Netherlands, Australia, Canada, Switzerland, Sweden, Japan
CVE-2026-27947: CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Intermesh groupoffice
Description
Group-Office is an enterprise customer relationship management and groupware tool. Versions prior to 26.0.9, 25.0.87, and 6.8.154 have an authenticated Remote Code Execution vulnerability in the TNEF attachment processing flow. The vulnerable path extracts attacker-controlled files from `winmail.dat` and then invokes `zip` with a shell wildcard (`*`). Because extracted filenames are attacker-controlled, they can be interpreted as `zip` options and lead to arbitrary command execution. Versions 26.0.9, 25.0.87, and 6.8.154 fix the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27947 affects Intermesh Group-Office, an enterprise CRM and groupware solution, in versions before 26.0.9, 25.0.87, and 6.8.154. The vulnerability is rooted in improper neutralization of argument delimiters (CWE-88) during the processing of TNEF attachments, specifically winmail.dat files. When Group-Office extracts files from these attachments, it invokes the zip command with a shell wildcard (*) to handle the extracted files. Because the filenames are attacker-controlled and not properly sanitized, they can be interpreted as command-line options by the zip utility. This allows an authenticated attacker to inject arbitrary commands, resulting in remote code execution on the server hosting Group-Office. The vulnerability also relates to CWE-434 (Unrestricted Upload of File with Dangerous Type), as malicious files are uploaded and processed. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and privileges required but no additional authentication tokens. The vulnerability impacts confidentiality, integrity, and availability with high scope and impact. Although no exploits are publicly known, the critical severity and ease of exploitation given authenticated access make this a significant risk. The issue is resolved in the specified patched versions.
Potential Impact
This vulnerability allows an authenticated attacker to execute arbitrary commands on the Group-Office server, potentially leading to full system compromise. The attacker could steal sensitive CRM and groupware data, manipulate or delete information, disrupt service availability, or use the compromised server as a pivot point for further network intrusion. Given Group-Office’s role in managing enterprise communications and customer data, exploitation could result in significant data breaches, operational disruption, and reputational damage. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with weak credential management or exposed login interfaces. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, making this a critical threat for organizations relying on affected versions of Group-Office.
Mitigation Recommendations
Organizations should immediately upgrade Group-Office to versions 26.0.9, 25.0.87, or 6.8.154 or later to remediate this vulnerability. In addition to patching, administrators should enforce strong authentication policies, including multi-factor authentication, to reduce the risk of attacker access. Restrict access to the Group-Office interface to trusted networks or VPNs where possible. Monitor logs for unusual activity related to TNEF attachment processing or zip command execution. Disable or restrict the use of TNEF attachments if not required. Implement application-level input validation and sanitization for file uploads to prevent malicious filenames. Consider deploying host-based intrusion detection systems to detect anomalous command executions. Regularly audit user accounts and permissions to minimize the number of users with access to vulnerable functionality. Finally, maintain up-to-date backups to recover from potential compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-25T03:11:36.690Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1fa6032ffcdb8a26d1c61
Added to database: 2/27/2026, 8:11:12 PM
Last enriched: 3/6/2026, 9:19:11 PM
Last updated: 4/13/2026, 3:45:04 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.