[2025.11 Vulnerability Report] Intermesh BV GroupOffice Remote Code Execution(CVE-2025-63406) | SECaaS Platform AIONCLOUD

Threat Intelligence Report

Get up-to-date information on web application vulnerabilities, attacks, and how to respond.

Back to Threat Intelligence Report

[2025.11 Vulnerability Report] Intermesh BV GroupOffice Remote Code Execution(CVE-2025-63406)

GroupOffice is a system provided to businesses, and the CVE-2025-63406 vulnerability in this service is a critical vulnerability that could allow remote code execution without authentication.

Given the detailed analysis of the vulnerability and the high potential for remote exploitation, exploitation attempts are expected to be active. Therefore, customers using this platform should patch to the latest version as soon as possible.

Our TA team is monitoring vulnerabilities in GroupOffice products and will respond promptly to any related vulnerabilities discovered in the future.

Tags: GroupOffice, RCE, CVE-2025-63406, Remote Code Execution, Intermaesh BV

1. Overview

GroupOffice is a web-based office management system used to manage content creation, distribution, and collaboration features.

This report summarizes the technical analysis of CVE-2025-63406, which occurred in a core component of the platform.

image.png

Source: https://github.com/Intermesh

2. Attack Type

CVE-2025-63406 is a Remote Code Execution (RCE) vulnerability that can be exploited over the network without authentication (Pre-Auth RCE).

This vulnerability occurs during the processing of the dbToApi() function in the FunctionField.php file. The function fails to properly validate user input, which is combined with PHP’s eval() function in the execution logic.

An attacker can manipulate HTTP request parameters so that the server interprets these inputs as malicious PHP code and executes them. This corresponds to CWE-94 (Code Injection).

Classes and functions used in the attack: The attacker triggers an endpoint that uses FunctionField.php's dbToApi() and eval() functions through a web request to inject a malicious payload.

image.png

Source: gemini.google.com

Example attack request:

POST /groupoffice/modules/core/FunctionField.php HTTP/1.1
Host: your-groupoffice-site.com
Content-Type: application/x-www-form-urlencoded
Connection: close
Content-Length: [BODY_LENGTH]

// ---------------------------------------------------- //
__PARAMETERS 파라미터가 dbToApi()를 통해 eval()에 전달되는 것을 시뮬레이션 // 악성 코드를 URL 인코딩하여 삽입 (예: system('whoami');)
// ----------------------------------------------------

PARAMETERS=functionField%5B__RCE_PAYLOAD_HERE%5D%3Dsystem%28%27id%27%29%3B


3. Mitigation

The developer, Intermesh BV, has acknowledged the vulnerability and released a security patch that resolves the issue.

Immediate update recommendation: Update GroupOffice to v.25.0.47 or later, or v.6.8.136 or later as soon as possible.
Our AIWAF is responding to this vulnerability using the 306: Arbitrary Code Execution detection pattern.

image.png

4. Conclusion

GroupOffice is a system provided for enterprise use, and the CVE-2025-63406 vulnerability found in this service is a critical issue that allows unauthenticated remote code execution.

Given the detailed analysis and the high likelihood of remote exploitation, exploitation attempts are expected to be active. Therefore, customers using this platform must apply the latest patch as quickly as possible.

Our TA team continues to monitor vulnerabilities occurring in GroupOffice products and will promptly respond to any related vulnerabilities discovered in the future.

5. References



https://nvd.nist.gov/vuln/detail/CVE-2025-63406
https://github.com/WinDyAlphA/CVE-2025-63406-PoC
https://noahheraud.com/posts/CVE-2025-63406/
Scroll Up