Group-Office is an enterprise customer relationship management and groupware tool. Prior to 6.8.150, 25.0.82, and 26.0.5, the MaintenanceController exposes an action zipLanguage which takes a lang parameter and passes it directly to a system zip command via exec(). This can be combined with uploading a crafted zip file to achieve remote code execution. This vulnerability is fixed in 6.8.150, 25.0.82, and 26.0.5.
References
| Link | Resource |
|---|---|
| https://github.com/Intermesh/groupoffice/commit/d28490a6a29936db7888aa841ab8ade88800540b | Patch |
| https://github.com/Intermesh/groupoffice/security/advisories/GHSA-v39j-549w-8849 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-02 23:16
Updated : 2026-02-18 17:35
NVD link : CVE-2026-25134
Mitre link : CVE-2026-25134
CVE.ORG link : CVE-2026-25134
JSON object : View
Products Affected
group-office
- group_office
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
