CVE-2025-48368

Source
https://cve.org/CVERecord?id=CVE-2025-48368
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-48368.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-48368
Aliases
  • GHSA-c49j-qvp9-vgg6
Published
2025-05-22T17:29:57.631Z
Modified
2025-12-02T20:06:45.952178Z
Severity
  • 5.8 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P CVSS Calculator
Summary
GroupOffice's DOM-Based XSS in all Date Input Fields Allows Arbitrary JavaScript Execution
Details

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.119 and 25.0.20, a DOM-based Cross-Site Scripting (XSS) vulnerability exists in the GroupOffice application, allowing attackers to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability can be triggered by injecting a crafted payload into a parameter that is later processed unsafely in the DOM. Versions 6.8.119 and 25.0.20 contain a fix for the issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48368.json",
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/intermesh/groupoffice

Affected ranges

Type
GIT
Repo
https://github.com/intermesh/groupoffice
Events

Affected versions

v25.*
v25.0.1
v25.0.10
v25.0.11
v25.0.12
v25.0.13
v25.0.14
v25.0.15
v25.0.16
v25.0.17
v25.0.18
v25.0.19
v25.0.2
v25.0.3
v25.0.4
v25.0.5
v25.0.6
v25.0.7
v25.0.8
v25.0.9
v6.*
v6.8.100
v6.8.101
v6.8.102
v6.8.103
v6.8.104
v6.8.105
v6.8.106
v6.8.107
v6.8.108
v6.8.109
v6.8.110
v6.8.111
v6.8.112
v6.8.113
v6.8.114
v6.8.115
v6.8.116
v6.8.117
v6.8.118
v6.8.95
v6.8.96
v6.8.97
v6.8.98
v6.8.99

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-48368.json"