CVE-2026-25512
Published: 04 February 2026
Description
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call.…
more
By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in versions 6.8.150, 25.0.82, and 26.0.5.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents shell metacharacter injection by requiring validation and sanitization of user-controlled inputs like tmp_file before concatenation into exec() calls.
Mandates timely flaw remediation through patching to vulnerable Group-Office versions, eliminating the command injection vulnerability.
Limits damage from RCE by enforcing least privilege on the server process executing arbitrary commands via the exploited exec() call.
Security SummaryAI
CVE-2026-25512 is a remote code execution (RCE) vulnerability in Group-Office, an enterprise customer relationship management and groupware tool. The flaw affects versions prior to 6.8.150, 25.0.82, and 26.0.5, stemming from the endpoint email/message/tnefAttachmentFromTempFile, which directly concatenates the user-controlled parameter tmp_file into an exec() call without proper sanitization. This enables shell metacharacter injection, classified under CWE-78 (OS Command Injection), with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows execution of arbitrary system commands on the server, potentially leading to high-impact compromise of confidentiality, integrity, and availability.
The vulnerability has been addressed in Group-Office versions 6.8.150, 25.0.82, and 26.0.5. Official advisories and the patching commit are available on the Intermesh/groupoffice GitHub repository, including security advisory GHSA-579w-jvg7-frr4 and commit 6c612deca97a6cd2a1bd4feea0ce7e8e9d907792.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
RCE via OS command injection (CWE-78) in a network-accessible web application endpoint (AV:N/PR:L), directly enabling exploitation of public-facing applications and Unix shell command execution.