Impact
The vulnerability is an SQL Injection in the JMAP Contact/query endpoint, allowing an authenticated user with addressbook access to read arbitrary database contents, including session tokens. This can enable full takeover of any user, including administrators, without password knowledge.
Affected Systems
Intermesh Group‑Office versions earlier than 6.8.158, 25.0.92 and 26.0.17 are affected. These are the enterprise CRM and groupware platform employed by many organizations.
Risk and Exploitability
The flaw scores a CVSS of 8.8, indicating high severity. EPSS data is not available and the vulnerability is not listed in CISA’s KEV catalog. The attack requires authentication and basic contact‑book read rights, so only users with such access can exploit it, but the impact remains significant due to the ability to obtain session tokens and hijack accounts.
OpenCVE Enrichment