LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command execution vulnerabilities that allow attackers to manipulate binary paths when changing system settings. Attackers can exploit these vulnerabilities by modifying configuration parameters like antivirus.command, ocr.Tesseract.path, and other system paths to execute arbitrary system commands with elevated privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 24 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command execution vulnerabilities that allow attackers to manipulate binary paths when changing system settings. Attackers can exploit these vulnerabilities by modifying configuration parameters like antivirus.command, ocr.Tesseract.path, and other system paths to execute arbitrary system commands with elevated privileges. | |
| Title | LogicalDOC Enterprise 7.7.4 Authenticated Command Execution via Binary Path Manipulation | |
| Weaknesses | CWE-426 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-24T20:21:30.648Z
Reserved: 2025-12-24T14:27:12.479Z
Link: CVE-2019-25257
Updated: 2025-12-24T20:00:48.317Z
Status : Received
Published: 2025-12-24T20:15:54.467
Modified: 2025-12-24T21:16:03.850
Link: CVE-2019-25257
No data.
OpenCVE Enrichment
No data.