Description
LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command execution vulnerabilities that allow attackers to manipulate binary paths when changing system settings. Attackers can exploit these vulnerabilities by modifying configuration parameters like antivirus.command, ocr.Tesseract.path, and other system paths to execute arbitrary system commands with elevated privileges.
Exploits (1)
References (3)
Core 3
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/44021
Various Sources product
https://www.logicaldoc.com
Third Party Advisory third-party-advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5452.php
Scores
CVSS v3
6.5
EPSS
0.0008
EPSS Percentile
24.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-426
Status
published
Products (9)
LogicalDOC Srl/LogicalDOC Enterprise
7.1.1
LogicalDOC Srl/LogicalDOC Enterprise
7.4.2
LogicalDOC Srl/LogicalDOC Enterprise
7.5.1
LogicalDOC Srl/LogicalDOC Enterprise
7.6.2
LogicalDOC Srl/LogicalDOC Enterprise
7.6.4
LogicalDOC Srl/LogicalDOC Enterprise
7.7.1
LogicalDOC Srl/LogicalDOC Enterprise
7.7.2
LogicalDOC Srl/LogicalDOC Enterprise
7.7.3
LogicalDOC Srl/LogicalDOC Enterprise
7.7.4
Published
Dec 24, 2025
Tracked Since
Feb 18, 2026