injection and arbitrary JavaScript execution in the victim's browser. This issue has been patched in versions 6.8.155, 25.0.88, and 26.0.10.","datePublished":"2026-03-06T21:14:03.149Z","dateModified":"2026-04-19T12:12:31.412Z","url":"https://radar.offseq.com/threat/cve-2026-30238-cwe-79-improper-neutralization-of-i-f7d87f56","author":{"@type":"Organization","name":"OffSeq Threat Intelligence","url":"https://radar.offseq.com"},"publisher":{"@type":"Organization","name":"OffSeq","logo":{"@type":"ImageObject","url":"https://radar.offseq.com/favicon.png"}},"mainEntityOfPage":{"@type":"WebPage","@id":"https://radar.offseq.com/threat/cve-2026-30238-cwe-79-improper-neutralization-of-i-f7d87f56"},"identifier":"CVE-2026-30238","contentRating":"MEDIUM","keywords":"cve,cve-2026-30238,cwe-79"}
Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30238: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Intermesh groupoffice

0
Medium
VulnerabilityCVE-2026-30238cvecve-2026-30238cwe-79
Published: Fri Mar 06 2026 (03/06/2026, 21:14:03 UTC)
Source: CVE Database V5
Vendor/Project: Intermesh
Product: groupoffice

Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.155, 25.0.88, and 26.0.10, there is a reflected XSS vulnerability in GroupOffice on the external/index flow. The f parameter (Base64 JSON) is decoded and then injected into an inline JavaScript block without strict escaping, allowing </script><script>...</script> injection and arbitrary JavaScript execution in the victim's browser. This issue has been patched in versions 6.8.155, 25.0.88, and 26.0.10.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:43:37 UTC

Technical Analysis

CVE-2026-30238 is a reflected cross-site scripting (XSS) vulnerability identified in the Intermesh GroupOffice enterprise CRM and groupware platform. The vulnerability affects versions prior to 6.8.155, 25.0.88, and 26.0.10. The root cause lies in the handling of the 'f' parameter within the external/index flow, which accepts Base64-encoded JSON data. This data is decoded and directly injected into an inline JavaScript block without adequate sanitization or escaping. Consequently, an attacker can craft a malicious payload that breaks out of the intended script context using sequences like </script><script> and inject arbitrary JavaScript code. When a victim accesses a specially crafted URL containing this payload, the malicious script executes in their browser under the context of the GroupOffice domain. This can lead to theft of session cookies, unauthorized actions on behalf of the user, or redirection to malicious sites. The vulnerability does not require authentication and can be exploited remotely, but it does require user interaction (clicking a malicious link). The CVSS v4.0 base score is 5.1, indicating medium severity, reflecting the ease of exploitation combined with limited impact on system integrity or availability. No public exploits or active exploitation campaigns have been reported to date. The issue has been addressed by the vendor in versions 6.8.155, 25.0.88, and 26.0.10 by implementing proper input validation and escaping to neutralize the injected script content.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of user sessions within GroupOffice deployments. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed with the victim's privileges. This can compromise user accounts and expose sensitive corporate data managed within GroupOffice. While the vulnerability does not directly affect system availability or server integrity, the indirect consequences such as data leakage or unauthorized access can be significant for organizations relying on GroupOffice for CRM and groupware functions. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where phishing or social engineering is feasible. Organizations with internet-facing GroupOffice instances are at higher risk, particularly if users have elevated privileges. The absence of known exploits reduces immediate threat but does not preclude future attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately upgrade GroupOffice to versions 6.8.155, 25.0.88, or 26.0.10 or later, where the vulnerability has been patched. Until upgrades can be applied, administrators should consider implementing web application firewall (WAF) rules to detect and block suspicious requests containing Base64-encoded payloads in the 'f' parameter or attempts to inject script tags. User education to recognize and avoid clicking suspicious links can reduce the risk of exploitation. Additionally, enforcing Content Security Policy (CSP) headers that restrict inline script execution and limit sources of executable scripts can mitigate the impact of XSS attacks. Regularly auditing and monitoring web server logs for anomalous requests targeting the vulnerable parameter can help identify attempted exploitation. Finally, ensure that session management employs secure flags (HttpOnly, Secure) to reduce the impact of stolen cookies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T17:23:59.798Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ab479ac48b3f10ffdbff88

Added to database: 3/6/2026, 9:31:06 PM

Last enriched: 3/14/2026, 7:43:37 PM

Last updated: 4/19/2026, 12:12:31 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses