No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 11 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intermesh
Intermesh group-office |
|
| Vendors & Products |
Intermesh
Intermesh group-office |
Fri, 06 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.155, 25.0.88, and 26.0.10, there is a reflected XSS vulnerability in GroupOffice on the external/index flow. The f parameter (Base64 JSON) is decoded and then injected into an inline JavaScript block without strict escaping, allowing </script><script>...</script> injection and arbitrary JavaScript execution in the victim's browser. This issue has been patched in versions 6.8.155, 25.0.88, and 26.0.10. | |
| Title | Group-Office: Reflected XSS in JavaScript context | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T20:54:28.592Z
Reserved: 2026-03-04T17:23:59.798Z
Link: CVE-2026-30238
Updated: 2026-03-09T20:47:28.305Z
Status : Analyzed
Published: 2026-03-06T22:16:01.437
Modified: 2026-03-11T13:32:48.030
Link: CVE-2026-30238
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:06:49Z