{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33755","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-23T18:30:14.125Z","datePublished":"2026-03-27T14:08:38.685Z","dateUpdated":"2026-03-27T17:23:30.752Z"},"containers":{"cna":{"title":"Authenticated SQL Injection in Contact/query addressBookIds filter","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-3gc4-5993-c2qc","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Intermesh/groupoffice/security/advisories/GHSA-3gc4-5993-c2qc"}],"affected":[{"vendor":"Intermesh","product":"groupoffice","versions":[{"version":"< 6.8.158","status":"affected"},{"version":"< 25.0.92","status":"affected"},{"version":"< 26.0.17","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-27T14:08:38.685Z"},"descriptions":[{"lang":"en","value":"Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue."}],"source":{"advisory":"GHSA-3gc4-5993-c2qc","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-27T17:23:14.328861Z","id":"CVE-2026-33755","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-27T17:23:30.752Z"}}]}}