Cyber Posture

CVE-2026-25512

HighPublic PoC

Published: 04 February 2026

Published
04 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2382 96.0th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call.…

more

By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in versions 6.8.150, 25.0.82, and 26.0.5.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents shell metacharacter injection by requiring validation and sanitization of user-controlled inputs like tmp_file before concatenation into exec() calls.

prevent

Mandates timely flaw remediation through patching to vulnerable Group-Office versions, eliminating the command injection vulnerability.

prevent

Limits damage from RCE by enforcing least privilege on the server process executing arbitrary commands via the exploited exec() call.

Security SummaryAI

CVE-2026-25512 is a remote code execution (RCE) vulnerability in Group-Office, an enterprise customer relationship management and groupware tool. The flaw affects versions prior to 6.8.150, 25.0.82, and 26.0.5, stemming from the endpoint email/message/tnefAttachmentFromTempFile, which directly concatenates the user-controlled parameter tmp_file into an exec() call without proper sanitization. This enables shell metacharacter injection, classified under CWE-78 (OS Command Injection), with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows execution of arbitrary system commands on the server, potentially leading to high-impact compromise of confidentiality, integrity, and availability.

The vulnerability has been addressed in Group-Office versions 6.8.150, 25.0.82, and 26.0.5. Official advisories and the patching commit are available on the Intermesh/groupoffice GitHub repository, including security advisory GHSA-579w-jvg7-frr4 and commit 6c612deca97a6cd2a1bd4feea0ce7e8e9d907792.

Details

CWE(s)

Affected Products

group-office
group office
≤ 6.8.150 · 25.0.1 — 25.0.82 · 26.0.1 — 26.0.5

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

RCE via OS command injection (CWE-78) in a network-accessible web application endpoint (AV:N/PR:L), directly enabling exploitation of public-facing applications and Unix shell command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References