Impact
A reflected XSS flaw exists in the installer license page of GroupOffice, where a POST variable is inserted into a textarea without escaping, permitting a CDATA break and arbitrary script execution. The vulnerability can be used to run malicious scripts in the browser of anyone who views the license page, potentially stealing session cookies or executing other client‑side attacks.
Affected Systems
Intermesh GroupOffice versions earlier than 6.8.155, 25.0.88, and 26.0.10 are affected. The flaw resides in the install/license.php endpoint used during installation.
Risk and Exploitability
The CVSS score of 2.1 indicates low severity, and the EPSS score of less than 1 % reflects a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to reach the installer page, which normally exists only on a freshly provisioned server; therefore the attack surface is limited. Despite the low risk, the flaw permits user‑containing script injection and should be remediated promptly.
OpenCVE Enrichment