We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48369

GroupOffice vulnerable to Stored XSS in Tasks Comment Section



Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a persistent Cross-Site Scripting (XSS) vulnerability exists in Groupoffice's tasks comment functionality, allowing attackers to execute arbitrary JavaScript by uploading an file with a crafted filename. When administrators or other users view the task containing this malicious file, the payload executes in their browser context. The application fails to sanitize image filenames before rendering them in the comment. By uploading an image with a crafted filename containing XSS payloads, attackers can steal sensitive information. Versions 6.8.119 and 25.0.20 contain a fix for the issue.

Reserved 2025-05-19 | Published 2025-05-22 | Updated 2025-05-22 | Assigner GitHub_M


MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 6.8.119
affected

< 25.0.20
affected

References

github.com/...office/security/advisories/GHSA-45jj-r48j-75pp

cve.org (CVE-2025-48369)

nvd.nist.gov (CVE-2025-48369)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48369

Support options

Helpdesk Chat, Email, Knowledgebase