PowerDocu contains a Windows GUI executable to perform technical documentations. Prior to 2.4.0, PowerDocu contains a critical security vulnerability in how it parses JSON files within Flow or App packages. The application blindly trusts the $type property in JSON files, allowing an attacker to instantiate arbitrary .NET objects and execute code. This vulnerability is fixed in 2.4.0.
References
| Link | Resource |
|---|---|
| https://github.com/modery/PowerDocu/releases/tag/v-2.4.0 | Product Release Notes |
| https://github.com/modery/PowerDocu/security/advisories/GHSA-m8j2-5jr7-2jpw | Exploit Mitigation Vendor Advisory |
Configurations
History
28 Feb 2026, 00:13
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Modery powerdocu
Modery |
|
| References | () https://github.com/modery/PowerDocu/releases/tag/v-2.4.0 - Product, Release Notes | |
| References | () https://github.com/modery/PowerDocu/security/advisories/GHSA-m8j2-5jr7-2jpw - Exploit, Mitigation, Vendor Advisory | |
| Summary |
|
|
| CPE | cpe:2.3:a:modery:powerdocu:*:*:*:*:*:*:*:* |
09 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 22:16
Updated : 2026-02-28 00:13
NVD link : CVE-2026-25925
Mitre link : CVE-2026-25925
CVE.ORG link : CVE-2026-25925
JSON object : View
Products Affected
modery
- powerdocu
CWE
CWE-502
Deserialization of Untrusted Data
