CVE-2019-25258

HIGH

LogicalDOC Enterprise 7.7.4 - Info Disclosure

Title source: llm
STIX 2.1

Description

LogicalDOC Enterprise 7.7.4 contains multiple post-authentication file disclosure vulnerabilities that allow attackers to read arbitrary files through unverified 'suffix' and 'fileVersion' parameters. Attackers can exploit directory traversal techniques in /thumbnail and /convertpdf endpoints to access sensitive system files like win.ini and /etc/passwd by manipulating path traversal sequences.

Exploits (1)

exploitdb WORKING POC
by LiquidWorm · textwebappsjava
https://www.exploit-db.com/exploits/44019

References (3)

Core 3
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/44019
Product product
https://www.logicaldoc.com
Exploit, Third Party Advisory third-party-advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5450.php

Scores

CVSS v3 7.5
EPSS 0.0188
EPSS Percentile 83.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (9)
logicaldoc/logicaldoc 7.1.1
logicaldoc/logicaldoc 7.4.2
logicaldoc/logicaldoc 7.5.1
logicaldoc/logicaldoc 7.6.2
logicaldoc/logicaldoc 7.6.4
logicaldoc/logicaldoc 7.7.1
logicaldoc/logicaldoc 7.7.2
logicaldoc/logicaldoc 7.7.3
logicaldoc/logicaldoc 7.7.4
Published Dec 24, 2025
Tracked Since Feb 18, 2026