CVE-2019-25258

LogicalDOC Enterprise 7.7.4 contains multiple post-authentication file disclosure vulnerabilities that allow attackers to read arbitrary files through unverified 'suffix' and 'fileVersion' parameters. Attackers can exploit directory traversal techniques in /thumbnail and /convertpdf endpoints to access sensitive system files like win.ini and /etc/passwd by manipulating path traversal sequences.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:logicaldoc:logicaldoc:7.1.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.4.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.5.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.6.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.6.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.4:*:*:*:enterprise:*:*:*

History

09 Jan 2026, 20:50

Type Values Removed Values Added
CPE cpe:2.3:a:logicaldoc:logicaldoc:7.4.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.6.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.5.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.6.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.1.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.2:*:*:*:enterprise:*:*:*
First Time Logicaldoc
Logicaldoc logicaldoc
References () https://www.exploit-db.com/exploits/44019 - () https://www.exploit-db.com/exploits/44019 - Exploit, Third Party Advisory
References () https://www.logicaldoc.com - () https://www.logicaldoc.com - Product
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5450.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5450.php - Exploit, Third Party Advisory

24 Dec 2025, 21:16

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/44019 - () https://www.exploit-db.com/exploits/44019 -
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5450.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5450.php -

24 Dec 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-24 20:15

Updated : 2026-01-09 20:50


NVD link : CVE-2019-25258

Mitre link : CVE-2019-25258

CVE.ORG link : CVE-2019-25258


JSON object : View

Products Affected

logicaldoc

  • logicaldoc
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')