<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Group-Office — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/group-office/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 15:16:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/group-office/feed.xml" rel="self" type="application/rss+xml"/><item><title>Group-Office JMAP Contact/Query SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-group-office-sqli/</link><pubDate>Fri, 27 Mar 2026 15:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-group-office-sqli/</guid><description>An authenticated SQL Injection vulnerability in Group-Office's JMAP Contact/query endpoint allows data extraction, including session tokens, leading to account takeover if unpatched.</description><content:encoded><![CDATA[<p>Group-Office, an enterprise CRM and groupware tool, contains a critical SQL injection vulnerability affecting versions prior to 6.8.158, 25.0.92, and 26.0.17. The vulnerability resides in the JMAP <code>Contact/query</code> endpoint. Any authenticated user with basic address book access can exploit this flaw to extract arbitrary data from the database. A successful exploit allows an attacker to retrieve sensitive information such as active session tokens belonging to other users. This can lead to complete account takeover, including the System Administrator account, without requiring the user&rsquo;s password. Applying the security patches released in versions 6.8.158, 25.0.92, and 26.0.17 resolves this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Group-Office application with a valid user account that has basic address book access privileges.</li>
<li>The attacker crafts a malicious JMAP <code>Contact/query</code> request containing a SQL injection payload within a parameter processed by the vulnerable endpoint.</li>
<li>The Group-Office application processes the crafted request without proper sanitization, allowing the SQL injection payload to be executed against the database.</li>
<li>The SQL injection attack is successful, allowing the attacker to extract sensitive information, including session tokens, user credentials, or other privileged data, from the database.</li>
<li>The attacker parses the database response and identifies valid session tokens belonging to other users.</li>
<li>The attacker uses the stolen session token to hijack another user&rsquo;s session, bypassing normal authentication procedures.</li>
<li>The attacker accesses the target user&rsquo;s account, gaining unauthorized access to sensitive data and functionalities.</li>
<li>Depending on the compromised user&rsquo;s privileges, the attacker can escalate privileges, access sensitive data, or perform administrative actions, leading to a complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to take over any account within the Group-Office system. The impact includes unauthorized access to sensitive customer data, financial records, and internal communications. System administrators are particularly at risk, as their compromise grants attackers full control over the Group-Office environment. This could lead to data breaches, service disruption, and reputational damage. The CVSS v3.1 base score is rated 8.8, highlighting the high severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Group-Office instances to version 6.8.158, 25.0.92, or 26.0.17 to patch CVE-2026-33755.</li>
<li>Inspect web server logs for suspicious POST requests to the <code>/jmap</code> endpoint containing potentially malicious SQL syntax, as indicated in the rule &ldquo;Group-Office Suspicious JMAP Contact Query&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Group-Office Potential Session Token Theft&rdquo; to detect unauthorized access attempts using potentially stolen session tokens.</li>
<li>Implement robust input validation and sanitization measures to prevent SQL injection vulnerabilities in all web applications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-33755</category><category>group-office</category><category>jmap</category></item></channel></rss>