LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command execution vulnerabilities that allow attackers to manipulate binary paths when changing system settings. Attackers can exploit these vulnerabilities by modifying configuration parameters like antivirus.command, ocr.Tesseract.path, and other system paths to execute arbitrary system commands with elevated privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Logicaldoc
Logicaldoc logicaldoc |
|
| Vendors & Products |
Logicaldoc
Logicaldoc logicaldoc |
Wed, 24 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command execution vulnerabilities that allow attackers to manipulate binary paths when changing system settings. Attackers can exploit these vulnerabilities by modifying configuration parameters like antivirus.command, ocr.Tesseract.path, and other system paths to execute arbitrary system commands with elevated privileges. | |
| Title | LogicalDOC Enterprise 7.7.4 Authenticated Command Execution via Binary Path Manipulation | |
| Weaknesses | CWE-426 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-24T19:28:06.119Z
Updated: 2025-12-24T20:21:30.648Z
Reserved: 2025-12-24T14:27:12.479Z
Link: CVE-2019-25257
Updated: 2025-12-24T20:00:48.317Z
Status : Awaiting Analysis
Published: 2025-12-24T20:15:54.467
Modified: 2025-12-29T15:58:13.147
Link: CVE-2019-25257
No data.