CVE-2026-27947

Enriched by CISA RCE
 

Group-Office is an enterprise customer relationship management and groupware tool. Versions prior to 26.0.9, 25.0.87, and 6.8.154 have an authenticated Remote Code Execution vulnerability in the TNEF attachment processing flow. The vulnerable path extracts attacker-controlled files from `winmail.dat` and then invokes `zip` with a shell wildcard (`*`). Because extracted filenames are attacker-controlled, they can be interpreted as `zip` options and lead to arbitrary command execution. Versions 26.0.9, 25.0.87, and 6.8.154 fix the issue.
https://nvd.nist.gov/vuln/detail/CVE-2026-27947

Categories

CWE-88 : Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Intermesh groupoffice
  • >= 26.0.0, < 26.0.9 [affected]
  • >= 25.0.0, < 25.0.87 [affected]
  • < 6.8.154 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
137 Parameter Injection
Medium
174 Flash Parameter Injection
Medium
41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
High
460 HTTP Parameter Pollution (HPP)
Medium
88 OS Command Injection
High