CVE-2026-25511

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, an authenticated user within the System Administrator group can trigger a full SSRF via the WOPI service discovery URL, including access to internal hosts/ports. The SSRF response body can be exfiltrated via the built‑in debug system, turning it into a visible SSRF. This also allows full server-side file read. This issue has been patched in versions 6.8.150, 25.0.82, and 26.0.5.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*
cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*
cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*

History

11 Feb 2026, 19:16

Type Values Removed Values Added
References () https://github.com/Intermesh/groupoffice/commit/5ac199dce758e1ce0d1cdb6905df5da3c2af42b3 - () https://github.com/Intermesh/groupoffice/commit/5ac199dce758e1ce0d1cdb6905df5da3c2af42b3 - Patch
References () https://github.com/Intermesh/groupoffice/security/advisories/GHSA-r9v4-jm2r-r9pm - () https://github.com/Intermesh/groupoffice/security/advisories/GHSA-r9v4-jm2r-r9pm - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
CPE cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*
First Time Group-office group Office
Group-office

05 Feb 2026, 21:15

Type Values Removed Values Added
References () https://github.com/Intermesh/groupoffice/security/advisories/GHSA-r9v4-jm2r-r9pm - () https://github.com/Intermesh/groupoffice/security/advisories/GHSA-r9v4-jm2r-r9pm -

04 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 21:16

Updated : 2026-02-11 19:16


NVD link : CVE-2026-25511

Mitre link : CVE-2026-25511

CVE.ORG link : CVE-2026-25511


JSON object : View

Products Affected

group-office

  • group_office
CWE
CWE-918

Server-Side Request Forgery (SSRF)