CVE-2026-25512

HIGH

CVSS v3

8.8

HIGH

EPSS Score

13.5%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call. By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in vers

Technical Details

CVSS v3 Vector
3.1
Published
2/4/2026
Last Modified
2/11/2026

Frequently Asked Questions

What is CVE-2026-25512?

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call. By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in vers

Is CVE-2026-25512 actively exploited?

Active exploitation of CVE-2026-25512 has not been confirmed. The EPSS score is 13.5%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2026-25512?

CVE-2026-25512 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.

Is CVE-2026-25512 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.