Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33755: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Intermesh groupoffice

0
High
VulnerabilityCVE-2026-33755cvecve-2026-33755cwe-89
Published: Fri Mar 27 2026 (03/27/2026, 14:08:38 UTC)
Source: CVE Database V5
Vendor/Project: Intermesh
Product: groupoffice

Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 14:46:58 UTC

Technical Analysis

CVE-2026-33755 is an authenticated SQL Injection vulnerability identified in the Intermesh Group-Office enterprise CRM and groupware software. The flaw resides in the JMAP Contact/query endpoint, which improperly neutralizes special elements in SQL commands, allowing an attacker with basic addressbook access to inject malicious SQL queries. This vulnerability enables extraction of arbitrary data from the backend database, including sensitive information such as active session tokens of other users. By leveraging these tokens, an attacker can perform full account takeover of any user, including the System Administrator, without needing their password. The vulnerability affects multiple major versions of Group-Office prior to 6.8.158, 25.0.92, and 26.0.17, which have addressed the issue in their respective patches. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction beyond authentication. Although exploitation requires valid credentials with minimal privileges, the ability to escalate to full administrative control makes this vulnerability particularly dangerous. No public exploits have been reported yet, but the vulnerability's nature suggests a high likelihood of exploitation once widely known. The flaw is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical injection weakness.

Potential Impact

The impact of CVE-2026-33755 is severe for organizations using vulnerable versions of Group-Office. Attackers with basic authenticated access can extract sensitive data from the database, including session tokens, enabling full account takeover of any user, including administrators. This compromises the confidentiality of all stored data, the integrity of user accounts and system configurations, and the availability of services if attackers disrupt operations. The ability to impersonate administrators allows attackers to manipulate or exfiltrate critical business information, potentially leading to data breaches, regulatory non-compliance, and reputational damage. Since Group-Office is used for CRM and groupware functions, the compromise could affect communications, scheduling, and customer data, impacting business continuity. The vulnerability's ease of exploitation and the lack of need for user interaction increase the risk of rapid exploitation in targeted or opportunistic attacks.

Mitigation Recommendations

To mitigate CVE-2026-33755, organizations should immediately upgrade Group-Office to versions 6.8.158, 25.0.92, or 26.0.17 or later, where the vulnerability is patched. Until upgrades can be applied, restrict access to the JMAP Contact/query endpoint by limiting authenticated user permissions and network access to trusted users only. Implement strict monitoring and logging of database queries and user activities to detect anomalous behavior indicative of SQL injection attempts or session token misuse. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable endpoint. Conduct regular security assessments and penetration testing focused on authentication and injection vulnerabilities. Additionally, enforce strong authentication mechanisms and session management policies to reduce the risk of session token theft and reuse. Educate users about the importance of safeguarding credentials and promptly reporting suspicious activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T18:30:14.125Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6949b3c064ed76fb5b753

Added to database: 3/27/2026, 2:30:51 PM

Last enriched: 3/27/2026, 2:46:58 PM

Last updated: 3/27/2026, 11:41:27 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses