HIGHCVE-2019-25258CVSS 7.5

CVE-2019-25258: Directory Traversal in LogicalDOC Enterprise

Platform

other

Component

logicaldoc-enterprise

Fixed in

7.7.5

7.7.4

7.7.3

7.7.2

7.6.5

7.6.3

7.5.2

7.4.3

7.1.2

AI Confidence: highNVDEPSS 1.9%Reviewed: May 2026

CVE-2019-25258 describes a directory traversal vulnerability discovered in LogicalDOC Enterprise. This vulnerability allows authenticated attackers to read arbitrary files on the system by manipulating parameters within the /thumbnail and /convertpdf endpoints. The vulnerability impacts versions 7.1.1 through 7.7.4, and a fix is available in version 7.7.5.

Impact and Attack Scenarios

Successful exploitation of CVE-2019-25258 allows an attacker to bypass access controls and read sensitive system files. By crafting malicious requests with carefully constructed path traversal sequences in the 'suffix' and 'fileVersion' parameters, an attacker can access files outside of the intended directories. This could include critical configuration files like win.ini or /etc/passwd on Linux systems, potentially exposing usernames, passwords, and other sensitive information. The ability to read system files could lead to further compromise of the LogicalDOC Enterprise server and potentially the entire network.

Exploitation Context

CVE-2019-25258 was published on December 24, 2025. There is no indication of active exploitation or inclusion in the CISA KEV catalog at this time. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it relatively straightforward to exploit given post-authentication access.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO
Internet ExposureHigh

EPSS

1.88% (83% percentile)

CISA SSVC

Exploitationpoc
Automatableno
Technical Impactpartial

CVSS Vector

THREAT INTELLIGENCE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N7.5HIGHAttack VectorNetworkHow the attacker reaches the targetAttack ComplexityLowConditions required to exploitPrivileges RequiredNoneAuthentication level needed to attackUser InteractionNoneWhether a victim must take actionScopeUnchangedImpact beyond the vulnerable componentConfidentialityHighRisk of sensitive data exposureIntegrityNoneRisk of unauthorized data modificationAvailabilityNoneRisk of service disruptionnextguardhq.com · CVSS v3.1 Base Score
What do these metrics mean?
Attack Vector
Network — remotely exploitable over the internet. No physical or local access required. Widest attack surface.
Attack Complexity
Low — no special conditions required. Attacker can exploit reliably without depending on rare configurations or timing.
Privileges Required
None — unauthenticated. No login or credentials needed to exploit.
User Interaction
None — attack is automatic and silent. Victim does nothing: no click, no file open.
Scope
Unchanged — impact is limited to the vulnerable component itself.
Confidentiality
High — complete confidentiality loss. Attacker can read all data: credentials, keys, personal data.
Integrity
None — no integrity impact. Attacker cannot modify data.
Availability
None — no availability impact. Service remains fully operational.

Affected Software

Componentlogicaldoc-enterprise
VendorLogicalDOC Srl
Affected rangeFixed in
7.7.4 – 7.7.47.7.5
7.7.3 – 7.7.37.7.4
7.7.2 – 7.7.27.7.3
7.7.1 – 7.7.17.7.2
7.6.4 – 7.6.47.6.5
7.6.2 – 7.6.27.6.3
7.5.1 – 7.5.17.5.2
7.4.2 – 7.4.27.4.3
7.1.1 – 7.1.17.1.2

Weakness Classification (CWE)

Timeline

  1. Reserved
  2. Published
  3. Modified
  4. EPSS updated

Mitigation and Workarounds

The primary mitigation for CVE-2019-25258 is to upgrade LogicalDOC Enterprise to version 7.7.5 or later, which contains the necessary fixes. If an immediate upgrade is not possible, consider implementing temporary workarounds such as restricting access to the /thumbnail and /convertpdf endpoints to trusted users only. Web Application Firewalls (WAFs) can be configured to detect and block requests containing suspicious path traversal sequences. Monitor access logs for unusual file access patterns, particularly requests targeting the /thumbnail and /convertpdf endpoints with unusual parameters.

How to fix

Actualizar LogicalDOC Enterprise a una versión posterior a 7.7.4 que corrija las vulnerabilidades de recorrido de directorios. Consultar el sitio web del proveedor para obtener la última versión y las instrucciones de actualización.

CVE Security Newsletter

Vulnerability analysis and critical alerts directly to your inbox.

Frequently asked questions

What is CVE-2019-25258 — Directory Traversal in LogicalDOC Enterprise?

CVE-2019-25258 is a vulnerability allowing authenticated attackers to read arbitrary files on a LogicalDOC Enterprise server by manipulating parameters in specific endpoints.

Am I affected by CVE-2019-25258 in LogicalDOC Enterprise?

You are affected if you are running LogicalDOC Enterprise versions 7.1.1 through 7.7.4. Upgrade to 7.7.5 or later to resolve the issue.

How do I fix CVE-2019-25258 in LogicalDOC Enterprise?

Upgrade LogicalDOC Enterprise to version 7.7.5 or later. As a temporary workaround, restrict access to the vulnerable endpoints and monitor access logs.

Is CVE-2019-25258 being actively exploited?

There is currently no evidence of active exploitation, but the vulnerability is relatively easy to exploit given post-authentication access.

Where can I find the official LogicalDOC advisory for CVE-2019-25258?

Refer to the LogicalDOC security advisories page for the latest information and updates regarding this vulnerability.

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.