We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48368

GroupOffice's DOM-Based XSS in all Date Input Fields Allows Arbitrary JavaScript Execution



Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a DOM-based Cross-Site Scripting (XSS) vulnerability exists in the GroupOffice application, allowing attackers to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability can be triggered by injecting a crafted payload into a parameter that is later processed unsafely in the DOM. Versions 6.8.119 and 25.0.20 contain a fix for the issue.

Reserved 2025-05-19 | Published 2025-05-22 | Updated 2025-05-22 | Assigner GitHub_M


MEDIUM: 5.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 6.8.119
affected

< 25.0.20
affected

References

github.com/...office/security/advisories/GHSA-c49j-qvp9-vgg6

cve.org (CVE-2025-48368)

nvd.nist.gov (CVE-2025-48368)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48368

Support options

Helpdesk Chat, Email, Knowledgebase