{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T20:08:46.503","vulnerabilities":[{"cve":{"id":"CVE-2024-22418","sourceIdentifier":"security-advisories@github.com","published":"2024-01-18T21:15:09.323","lastModified":"2024-11-21T08:56:14.857","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Group-Office is an enterprise CRM and groupware tool. Affected versions are subject to a vulnerability which is present in the file upload mechanism of Group Office. It allows an attacker to execute arbitrary JavaScript code by embedding it within a file's name. For instance, using a filename such as “><img src=x onerror=prompt('XSS')>.jpg” triggers the vulnerability. When this file is uploaded, the JavaScript code within the filename is executed. This issue has been addressed in version 6.8.29. All users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"Group-Office es una herramienta de software colaborativo y CRM empresarial. Las versiones afectadas están sujetas a una vulnerabilidad que está presente en el mecanismo de carga de archivos de Group Office. Permite a un atacante ejecutar código JavaScript arbitrario incrustándolo en el nombre de un archivo. Por ejemplo, el uso de un nombre de archivo como “&gt;.jpg” desencadena la vulnerabilidad. Cuando se carga este archivo, se ejecuta el código JavaScript dentro del nombre del archivo. Este problema se solucionó en la versión 6.8.29. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*","versionEndExcluding":"6.8.29","matchCriteriaId":"1AE49BB1-ACBD-414E-AEC5-DD52DC23E670"}]}]}],"references":[{"url":"https://github.com/Intermesh/groupoffice/commit/2a52a5d42d080db6738d70eba30294bcd94ebd09","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/Intermesh/groupoffice/commit/2a52a5d42d080db6738d70eba30294bcd94ebd09","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}