Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-63406 PoC — groupoffice 安全漏洞

Source
Associated Vulnerability
Title:groupoffice 安全漏洞 (CVE-2025-63406)
Description:groupoffice是Intermesh开源的一个集团办公室群件和CRM。 groupoffice 25.0.47之前版本和6.8.136之前版本存在安全漏洞,该漏洞源于FunctionField.php中的dbToApi和eval函数存在缺陷,可能导致执行任意代码。
Description
Small PoC to automate exploitation of CVE-2025-63406.
Readme
# CVE-2025-63406 PoC

## Installation

```bash
# Install dependencies
pip install -r requirements.txt

# Or use a virtual environment
python3 -m venv venv
source venv/bin/activate  # On Windows: venv\Scripts\activate
pip install -r requirements.txt
```

## Usage

```bash
python3 CVE-2025-63406.py -u <URL> -n <USERNAME> -p <PASSWORD> -c <COMMAND>
```

### Arguments

- `-u, --url`: Base URL of the GroupOffice instance (e.g., `http://localhost:9090`)
- `-n, --username`: Username for authentication
- `-p, --password`: Password for authentication
- `-c, --command`: System command to execute (e.g., `whoami`, `id`, `ls -la`)

### Examples

```bash
# Execute whoami command
python3 CVE-2025-63406.py -u http://localhost:9090 -n admin -p password -c whoami

# Execute id command
python3 CVE-2025-63406.py -u http://target.com:9090 -n admin -p password -c id

# List files in current directory
python3 CVE-2025-63406.py -u http://target.com:9090 -n admin -p password -c "ls -la"

# Get system information
python3 CVE-2025-63406.py -u http://target.com:9090 -n admin -p password -c "uname -a"
```

   ![PoC in usage with id command](https://raw.githubusercontent.com/WinDyAlphA/miscDownloads/refs/heads/main/poc_cve_id.png)
   ![PoC in usage with "uname -a" command](https://raw.githubusercontent.com/WinDyAlphA/miscDownloads/refs/heads/main/poc_cve_uname.png)

## Disclaimer

⚠️ **This tool is for authorized testing only. Unauthorized access to computer systems is illegal.**
File Snapshot

[4.0K] /data/pocs/55b0f229190f80dc6b7c6ad0191ab77002889409 ├── [4.4K] CVE-2025-63406.py ├── [1.4K] README.md └── [ 9] requirements.txt 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.