CVE-2026-25512
HIGHCVSS v3
8.8
HIGH
EPSS Score
13.5%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call. By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in vers
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 2/4/2026
- Last Modified
- 2/11/2026
Frequently Asked Questions
What is CVE-2026-25512?
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.150, 25.0.82, and 26.0.5, there is a remote code execution (RCE) vulnerability in Group-Office. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call. By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. This issue has been patched in vers
Is CVE-2026-25512 actively exploited?
Active exploitation of CVE-2026-25512 has not been confirmed. The EPSS score is 13.5%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2026-25512?
CVE-2026-25512 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.
Is CVE-2026-25512 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.