Group-Office is an enterprise customer relationship management and groupware tool. Versions prior to 26.0.8, 25.0.87, and 6.8.153 have a SQL Injection (SQLi) vulnerability, exploitable through the `advancedQueryData` parameter (`comparator` field) on an authenticated endpoint. The endpoint `index.php?r=email/template/emailSelection` processes `advancedQueryData` and forwards the SQL comparator without a strict allowlist into SQL condition building. This enables blind boolean-based exfiltration of the `core_auth_password` table. Versions 26.0.8, 25.0.87, and 6.8.153 fix the issue.
References
| Link | Resource |
|---|---|
| https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vfgv-8w8v-qpxr | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-27 20:21
Updated : 2026-03-04 16:10
NVD link : CVE-2026-27832
Mitre link : CVE-2026-27832
CVE.ORG link : CVE-2026-27832
JSON object : View
Products Affected
intermesh
- group-office
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
