{"api_version":"1","generated_at":"2026-04-22T19:52:00+00:00","cve":"CVE-2026-33755","urls":{"html":"https://cve.report/CVE-2026-33755","api":"https://cve.report/api/cve/CVE-2026-33755.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-33755","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-33755"},"summary":{"title":"Authenticated SQL Injection in Contact/query addressBookIds filter","description":"Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-03-27 15:16:57","updated_at":"2026-04-20 12:35:02"},"problem_types":["CWE-89","CWE-89 CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-3gc4-5993-c2qc","name":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-3gc4-5993-c2qc","refsource":"security-advisories@github.com","tags":["Vendor Advisory","Exploit"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-33755","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33755","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Intermesh","product":"groupoffice","version":"affected < 6.8.158","platforms":[]},{"source":"CNA","vendor":"Intermesh","product":"groupoffice","version":"affected < 25.0.92","platforms":[]},{"source":"CNA","vendor":"Intermesh","product":"groupoffice","version":"affected < 26.0.17","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"33755","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intermesh","cpe5":"group-office","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"33755","cve":"CVE-2026-33755","epss":"0.000340000","percentile":"0.098790000","score_date":"2026-04-06","updated_at":"2026-04-07 00:04:51"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-33755","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-03-27T17:23:14.328861Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-27T17:23:30.752Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"groupoffice","vendor":"Intermesh","versions":[{"status":"affected","version":"< 6.8.158"},{"status":"affected","version":"< 25.0.92"},{"status":"affected","version":"< 26.0.17"}]}],"descriptions":[{"lang":"en","value":"Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-27T14:08:38.685Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-3gc4-5993-c2qc","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-3gc4-5993-c2qc"}],"source":{"advisory":"GHSA-3gc4-5993-c2qc","discovery":"UNKNOWN"},"title":"Authenticated SQL Injection in Contact/query addressBookIds filter"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-33755","datePublished":"2026-03-27T14:08:38.685Z","dateReserved":"2026-03-23T18:30:14.125Z","dateUpdated":"2026-03-27T17:23:30.752Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-27 15:16:57","lastModifiedDate":"2026-04-20 12:35:02","problem_types":["CWE-89","CWE-89 CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*","versionEndExcluding":"6.8.158","matchCriteriaId":"40BD9AB8-AC8D-4928-9DAB-15A33BBE5AAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*","versionStartIncluding":"25.0.1","versionEndExcluding":"25.0.92","matchCriteriaId":"748DBF3E-60C2-41BA-843A-FA2831109D31"},{"vulnerable":true,"criteria":"cpe:2.3:a:intermesh:group-office:*:*:*:*:*:*:*:*","versionStartIncluding":"26.0.1","versionEndExcluding":"26.0.17","matchCriteriaId":"D973CC63-2DD1-4328-B099-BFD723BF048C"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"33755","Ordinal":"1","Title":"Authenticated SQL Injection in Contact/query addressBookIds filt","CVE":"CVE-2026-33755","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"33755","Ordinal":"1","NoteData":"Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue.","Type":"Description","Title":"Authenticated SQL Injection in Contact/query addressBookIds filt"}]}}}