Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Group-office
Group-office group Office |
|
| CPEs | cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Group-office
Group-office group Office |
|
| Metrics |
cvssV3_1
|
Thu, 05 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intermesh
Intermesh group-office |
|
| Vendors & Products |
Intermesh
Intermesh group-office |
Wed, 04 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call. By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in versions 6.8.150, 25.0.82, and 26.0.5. | |
| Title | Group-Office is vulnerable to RCE due to Command Injection via TNEF Attachment Handler | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-05T21:03:24.677Z
Reserved: 2026-02-02T18:21:42.486Z
Link: CVE-2026-25512
Updated: 2026-02-05T21:03:05.293Z
Status : Analyzed
Published: 2026-02-04T21:16:02.390
Modified: 2026-02-11T19:15:49.477
Link: CVE-2026-25512
No data.
OpenCVE Enrichment
Updated: 2026-04-17T23:15:30Z