CVE-2026-33755: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Intermesh groupoffice
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue.
AI Analysis
Technical Summary
CVE-2026-33755 is an authenticated SQL Injection vulnerability identified in the Intermesh Group-Office enterprise CRM and groupware software. The flaw resides in the JMAP Contact/query endpoint, which improperly neutralizes special elements in SQL commands, allowing an attacker with basic addressbook access to inject malicious SQL queries. This vulnerability enables extraction of arbitrary data from the backend database, including sensitive information such as active session tokens of other users. By leveraging these tokens, an attacker can perform full account takeover of any user, including the System Administrator, without needing their password. The vulnerability affects multiple major versions of Group-Office prior to 6.8.158, 25.0.92, and 26.0.17, which have addressed the issue in their respective patches. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction beyond authentication. Although exploitation requires valid credentials with minimal privileges, the ability to escalate to full administrative control makes this vulnerability particularly dangerous. No public exploits have been reported yet, but the vulnerability's nature suggests a high likelihood of exploitation once widely known. The flaw is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical injection weakness.
Potential Impact
The impact of CVE-2026-33755 is severe for organizations using vulnerable versions of Group-Office. Attackers with basic authenticated access can extract sensitive data from the database, including session tokens, enabling full account takeover of any user, including administrators. This compromises the confidentiality of all stored data, the integrity of user accounts and system configurations, and the availability of services if attackers disrupt operations. The ability to impersonate administrators allows attackers to manipulate or exfiltrate critical business information, potentially leading to data breaches, regulatory non-compliance, and reputational damage. Since Group-Office is used for CRM and groupware functions, the compromise could affect communications, scheduling, and customer data, impacting business continuity. The vulnerability's ease of exploitation and the lack of need for user interaction increase the risk of rapid exploitation in targeted or opportunistic attacks.
Mitigation Recommendations
To mitigate CVE-2026-33755, organizations should immediately upgrade Group-Office to versions 6.8.158, 25.0.92, or 26.0.17 or later, where the vulnerability is patched. Until upgrades can be applied, restrict access to the JMAP Contact/query endpoint by limiting authenticated user permissions and network access to trusted users only. Implement strict monitoring and logging of database queries and user activities to detect anomalous behavior indicative of SQL injection attempts or session token misuse. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable endpoint. Conduct regular security assessments and penetration testing focused on authentication and injection vulnerabilities. Additionally, enforce strong authentication mechanisms and session management policies to reduce the risk of session token theft and reuse. Educate users about the importance of safeguarding credentials and promptly reporting suspicious activity.
Affected Countries
United States, Germany, United Kingdom, France, Netherlands, Australia, Canada, Sweden, Switzerland, Belgium
CVE-2026-33755: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Intermesh groupoffice
Description
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33755 is an authenticated SQL Injection vulnerability identified in the Intermesh Group-Office enterprise CRM and groupware software. The flaw resides in the JMAP Contact/query endpoint, which improperly neutralizes special elements in SQL commands, allowing an attacker with basic addressbook access to inject malicious SQL queries. This vulnerability enables extraction of arbitrary data from the backend database, including sensitive information such as active session tokens of other users. By leveraging these tokens, an attacker can perform full account takeover of any user, including the System Administrator, without needing their password. The vulnerability affects multiple major versions of Group-Office prior to 6.8.158, 25.0.92, and 26.0.17, which have addressed the issue in their respective patches. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction beyond authentication. Although exploitation requires valid credentials with minimal privileges, the ability to escalate to full administrative control makes this vulnerability particularly dangerous. No public exploits have been reported yet, but the vulnerability's nature suggests a high likelihood of exploitation once widely known. The flaw is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical injection weakness.
Potential Impact
The impact of CVE-2026-33755 is severe for organizations using vulnerable versions of Group-Office. Attackers with basic authenticated access can extract sensitive data from the database, including session tokens, enabling full account takeover of any user, including administrators. This compromises the confidentiality of all stored data, the integrity of user accounts and system configurations, and the availability of services if attackers disrupt operations. The ability to impersonate administrators allows attackers to manipulate or exfiltrate critical business information, potentially leading to data breaches, regulatory non-compliance, and reputational damage. Since Group-Office is used for CRM and groupware functions, the compromise could affect communications, scheduling, and customer data, impacting business continuity. The vulnerability's ease of exploitation and the lack of need for user interaction increase the risk of rapid exploitation in targeted or opportunistic attacks.
Mitigation Recommendations
To mitigate CVE-2026-33755, organizations should immediately upgrade Group-Office to versions 6.8.158, 25.0.92, or 26.0.17 or later, where the vulnerability is patched. Until upgrades can be applied, restrict access to the JMAP Contact/query endpoint by limiting authenticated user permissions and network access to trusted users only. Implement strict monitoring and logging of database queries and user activities to detect anomalous behavior indicative of SQL injection attempts or session token misuse. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable endpoint. Conduct regular security assessments and penetration testing focused on authentication and injection vulnerabilities. Additionally, enforce strong authentication mechanisms and session management policies to reduce the risk of session token theft and reuse. Educate users about the importance of safeguarding credentials and promptly reporting suspicious activity.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T18:30:14.125Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c6949b3c064ed76fb5b753
Added to database: 3/27/2026, 2:30:51 PM
Last enriched: 3/27/2026, 2:46:58 PM
Last updated: 3/27/2026, 11:41:27 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.