Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.155, 25.0.88, and 26.0.10, there is a reflected XSS vulnerability in GroupOffice on the external/index flow. The f parameter (Base64 JSON) is decoded and then injected into an inline JavaScript block without strict escaping, allowing </script><script>...</script> injection and arbitrary JavaScript execution in the victim's browser. This issue has been patched in versions 6.8.155, 25.0.88, and 26.0.10.
References
| Link | Resource |
|---|---|
| https://github.com/Intermesh/groupoffice/security/advisories/GHSA-7p2f-c33m-rv5v | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-06 22:16
Updated : 2026-03-11 13:32
NVD link : CVE-2026-30238
Mitre link : CVE-2026-30238
CVE.ORG link : CVE-2026-30238
JSON object : View
Products Affected
intermesh
- group-office
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
