Home

Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.156, 25.0.90, and 26.0.12, a vulnerability in the AbstractSettingsCollection model leads to insecure deserialization when these settings are loaded. By injecting a serialized FileCookieJar object into a setting string, an authenticated attacker can achieve Arbitrary File Write, leading directly to Remote Code Execution (RCE) on the server. This issue has been patched in versions 6.8.156, 25.0.90, and 26.0.12.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

< 6.8.156
affected

< 25.0.90
affected

< 26.0.12
affected

References

github.com/...office/security/advisories/GHSA-h22j-frrf-5vxq

github.com/Intermesh/groupoffice/releases/tag/v25.0.90

github.com/Intermesh/groupoffice/releases/tag/v26.0.12

github.com/Intermesh/groupoffice/releases/tag/v6.8.156

cve.org (CVE-2026-34838)

nvd.nist.gov (CVE-2026-34838)

Download JSON