Cyber Posture

CVE-2026-25512

HighPublic PoCRCE

Published: 04 February 2026

Published
04 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2382 96.1th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25512 is a high-severity OS Command Injection (CWE-78) vulnerability in Group-Office Group Office. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents shell metacharacter injection by requiring validation and sanitization of user-controlled inputs like tmp_file before concatenation into exec() calls.

prevent

Mandates timely flaw remediation through patching to vulnerable Group-Office versions, eliminating the command injection vulnerability.

prevent

Limits damage from RCE by enforcing least privilege on the server process executing arbitrary commands via the exploited exec() call.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

RCE via OS command injection (CWE-78) in a network-accessible web application endpoint (AV:N/PR:L), directly enabling exploitation of public-facing applications and Unix shell command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call.…

more

By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in versions 6.8.150, 25.0.82, and 26.0.5.

Deeper analysisAI

CVE-2026-25512 is a remote code execution (RCE) vulnerability in Group-Office, an enterprise customer relationship management and groupware tool. The flaw affects versions prior to 6.8.150, 25.0.82, and 26.0.5, stemming from the endpoint email/message/tnefAttachmentFromTempFile, which directly concatenates the user-controlled parameter tmp_file into an exec() call without proper sanitization. This enables shell metacharacter injection, classified under CWE-78 (OS Command Injection), with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows execution of arbitrary system commands on the server, potentially leading to high-impact compromise of confidentiality, integrity, and availability.

The vulnerability has been addressed in Group-Office versions 6.8.150, 25.0.82, and 26.0.5. Official advisories and the patching commit are available on the Intermesh/groupoffice GitHub repository, including security advisory GHSA-579w-jvg7-frr4 and commit 6c612deca97a6cd2a1bd4feea0ce7e8e9d907792.

Details

CWE(s)

Affected Products

group-office
group office
≤ 6.8.150 · 25.0.1 — 25.0.82 · 26.0.1 — 26.0.5

CVEs Like This One

CVE-2026-25134Same product: Group-Office Group Office
CVE-2025-63406Same product: Group-Office Group Office
CVE-2026-1961Shared CWE-78
CVE-2025-54418Shared CWE-78
CVE-2025-20349Shared CWE-78
CVE-2026-4802Shared CWE-78
CVE-2026-25857Shared CWE-78
CVE-2025-27364Shared CWE-78
CVE-2025-7382Shared CWE-78
CVE-2026-42364Shared CWE-78

References