Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-63406 PoC — groupoffice 安全漏洞

Source
Associated Vulnerability
Title:groupoffice 安全漏洞 (CVE-2025-63406)
Description:groupoffice是Intermesh开源的一个集团办公室群件和CRM。 groupoffice 25.0.47之前版本和6.8.136之前版本存在安全漏洞,该漏洞源于FunctionField.php中的dbToApi和eval函数存在缺陷,可能导致执行任意代码。
Readme
# CVE-2025-63406 – Security Research Proof-of-Concept (PoC)

This repository contains a **research-oriented Proof of Concept (PoC)** related to the security issue **CVE-2025-63406**, affecting the **GroupOffice** platform.  
The purpose of this project is to **study and understand the vulnerability’s behavior**, assist security teams in **risk evaluation**, and help validate **patches and mitigations** in controlled environments.

> ⚠️ **Important Notice**  
> This PoC is provided **strictly for authorized security research, auditing, and educational analysis**.  
> It must **not** be used against systems without explicit permission.

---

## 🔍 About the Vulnerability

CVE-2025-63406 describes a condition in which internal handling of GroupOffice objects—specifically **FieldSet**, **Field**, and **Task** entities—may lead to unintended behavior under certain circumstances.

This project aims to:

- Analyze how the vulnerability can manifest.
- Explore how logical chains involving *create/update/destroy* operations behave.
- Demonstrate the API flow and internal state transitions.
- Help researchers replicate and validate the issue in a safe, isolated environment.

The provided source code focuses on the **logic flow**, not on enabling exploitation.

---

## 🧩 Code Overview

The PoC script demonstrates:

- URL normalization and input sanitization.
- Authentication flow using GroupOffice’s API.
- Retrieval and management of session cookies and CSRF tokens.
- Creation and removal of **FieldSet** and **Field** objects.
- Interaction with the **JMAP API** (`/api/jmap.php`).
- Extraction and inspection of server-side state responses.
- Identification and cleanup of previously created research artifacts.

This structure is intended for analysis and understanding of internal behavior rather than practical exploitation.

---

## 🧪 Research Goals

This PoC assists researchers in:

- Understanding how the vulnerability arises.
- Reproducing the logical sequence of events internally.
- Observing object handling mechanisms inside GroupOffice.
- Testing and validating vendor patches in a controlled environment.

---

## ⚙️ Environment Requirements

To run the PoC in a **safe, isolated research environment**, you will need:

- Python **3.10+**
- The `requests` library
- A controlled, local, test-only instance of GroupOffice affected by CVE-2025-63406

---

## ⚠️ Ethical & Responsible Use

This project must **only** be used for:

✔️ Internal security auditing  
✔️ Research and vulnerability analysis  
✔️ Patch validation  
✔️ Educational study in isolated labs 

## 🔥 USAGE

```bash
python3 CVE-2025-63406.py \
    --target <TARGET_URL> \
    --username <USERNAME> \
    --password <PASSWORD> \
    --command <TEST_COMMAND>
```

## 📄 Requirements

See the `requirements.txt` file for Python dependencies.

File Snapshot

[4.0K] /data/pocs/3b3ee50396d495fef2356dad5b50feca70e9df38 ├── [ 10K] CVE-2025-63406.py ├── [2.8K] README.md └── [ 17] requirements.txt 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.