Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Group-office
Group-office group Office |
|
| CPEs | cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Group-office
Group-office group Office |
|
| Metrics |
cvssV3_1
|
Thu, 05 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intermesh
Intermesh group-office |
|
| Vendors & Products |
Intermesh
Intermesh group-office |
Wed, 04 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, an authenticated user within the System Administrator group can trigger a full SSRF via the WOPI service discovery URL, including access to internal hosts/ports. The SSRF response body can be exfiltrated via the built‑in debug system, turning it into a visible SSRF. This also allows full server-side file read. This issue has been patched in versions 6.8.150, 25.0.82, and 26.0.5. | |
| Title | Group-Office is vulnerable to SSRF and File Read in WOPI service discovery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-05T21:02:22.830Z
Reserved: 2026-02-02T18:21:42.486Z
Link: CVE-2026-25511
Updated: 2026-02-05T21:02:08.037Z
Status : Analyzed
Published: 2026-02-04T21:16:02.243
Modified: 2026-02-11T19:16:29.217
Link: CVE-2026-25511
No data.
OpenCVE Enrichment
Updated: 2026-04-17T23:15:30Z