Vulnerability Description
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a stored and blind cross-site scripting (XSS) vulnerability exists in the Name Field of the user profile. A malicious attacker can change their name to a javascript payload, which is executed when a user adds the malicious user to their Synchronization > Address books. This issue has been patched in versions 6.8.123 and 25.0.27.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intermesh | Group-Office | < 6.8.123 |
Related Weaknesses (CWE)
References
- https://github.com/Intermesh/groupoffice/commit/2e3695db9cdef1da7a9d754ff4d98f49Patch
- https://github.com/Intermesh/groupoffice/security/advisories/GHSA-j35g-q5mc-jwgpExploitThird Party Advisory
FAQ
What is CVE-2025-48992?
CVE-2025-48992 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a stored and blind cross-site scripting (XSS) vulnerability exists in the Name...
How severe is CVE-2025-48992?
CVE-2025-48992 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-48992?
Check the references section above for vendor advisories and patch information. Affected products include: Intermesh Group-Office.