Description
LogicalDOC Enterprise 7.7.4 contains multiple post-authentication file disclosure vulnerabilities that allow attackers to read arbitrary files through unverified 'suffix' and 'fileVersion' parameters. Attackers can exploit directory traversal techniques in /thumbnail and /convertpdf endpoints to access sensitive system files like win.ini and /etc/passwd by manipulating path traversal sequences.
Exploits (1)
References (3)
Core 3
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/44019
Product product
https://www.logicaldoc.com
Exploit, Third Party Advisory third-party-advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5450.php
Scores
CVSS v3
7.5
EPSS
0.0188
EPSS Percentile
83.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (9)
logicaldoc/logicaldoc
7.1.1
logicaldoc/logicaldoc
7.4.2
logicaldoc/logicaldoc
7.5.1
logicaldoc/logicaldoc
7.6.2
logicaldoc/logicaldoc
7.6.4
logicaldoc/logicaldoc
7.7.1
logicaldoc/logicaldoc
7.7.2
logicaldoc/logicaldoc
7.7.3
logicaldoc/logicaldoc
7.7.4
Published
Dec 24, 2025
Tracked Since
Feb 18, 2026