CVE-2019-25258: Directory Traversal in LogicalDOC Enterprise
Platform
other
Component
logicaldoc-enterprise
Fixed in
7.7.5
7.7.4
7.7.3
7.7.2
7.6.5
7.6.3
7.5.2
7.4.3
7.1.2
CVE-2019-25258 describes a directory traversal vulnerability discovered in LogicalDOC Enterprise. This vulnerability allows authenticated attackers to read arbitrary files on the system by manipulating parameters within the /thumbnail and /convertpdf endpoints. The vulnerability impacts versions 7.1.1 through 7.7.4, and a fix is available in version 7.7.5.
Impact and Attack Scenarios
Successful exploitation of CVE-2019-25258 allows an attacker to bypass access controls and read sensitive system files. By crafting malicious requests with carefully constructed path traversal sequences in the 'suffix' and 'fileVersion' parameters, an attacker can access files outside of the intended directories. This could include critical configuration files like win.ini or /etc/passwd on Linux systems, potentially exposing usernames, passwords, and other sensitive information. The ability to read system files could lead to further compromise of the LogicalDOC Enterprise server and potentially the entire network.
Exploitation Context
CVE-2019-25258 was published on December 24, 2025. There is no indication of active exploitation or inclusion in the CISA KEV catalog at this time. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it relatively straightforward to exploit given post-authentication access.
Threat Intelligence
Exploit Status
EPSS
1.88% (83% percentile)
CISA SSVC
CVSS Vector
What do these metrics mean?
- Attack Vector
- Network — remotely exploitable over the internet. No physical or local access required. Widest attack surface.
- Attack Complexity
- Low — no special conditions required. Attacker can exploit reliably without depending on rare configurations or timing.
- Privileges Required
- None — unauthenticated. No login or credentials needed to exploit.
- User Interaction
- None — attack is automatic and silent. Victim does nothing: no click, no file open.
- Scope
- Unchanged — impact is limited to the vulnerable component itself.
- Confidentiality
- High — complete confidentiality loss. Attacker can read all data: credentials, keys, personal data.
- Integrity
- None — no integrity impact. Attacker cannot modify data.
- Availability
- None — no availability impact. Service remains fully operational.
Affected Software
Weakness Classification (CWE)
Timeline
- Reserved
- Published
- Modified
- EPSS updated
Mitigation and Workarounds
The primary mitigation for CVE-2019-25258 is to upgrade LogicalDOC Enterprise to version 7.7.5 or later, which contains the necessary fixes. If an immediate upgrade is not possible, consider implementing temporary workarounds such as restricting access to the /thumbnail and /convertpdf endpoints to trusted users only. Web Application Firewalls (WAFs) can be configured to detect and block requests containing suspicious path traversal sequences. Monitor access logs for unusual file access patterns, particularly requests targeting the /thumbnail and /convertpdf endpoints with unusual parameters.
How to fix
Actualizar LogicalDOC Enterprise a una versión posterior a 7.7.4 que corrija las vulnerabilidades de recorrido de directorios. Consultar el sitio web del proveedor para obtener la última versión y las instrucciones de actualización.
CVE Security Newsletter
Vulnerability analysis and critical alerts directly to your inbox.
Frequently asked questions
What is CVE-2019-25258 — Directory Traversal in LogicalDOC Enterprise?
CVE-2019-25258 is a vulnerability allowing authenticated attackers to read arbitrary files on a LogicalDOC Enterprise server by manipulating parameters in specific endpoints.
Am I affected by CVE-2019-25258 in LogicalDOC Enterprise?
You are affected if you are running LogicalDOC Enterprise versions 7.1.1 through 7.7.4. Upgrade to 7.7.5 or later to resolve the issue.
How do I fix CVE-2019-25258 in LogicalDOC Enterprise?
Upgrade LogicalDOC Enterprise to version 7.7.5 or later. As a temporary workaround, restrict access to the vulnerable endpoints and monitor access logs.
Is CVE-2019-25258 being actively exploited?
There is currently no evidence of active exploitation, but the vulnerability is relatively easy to exploit given post-authentication access.
Where can I find the official LogicalDOC advisory for CVE-2019-25258?
Refer to the LogicalDOC security advisories page for the latest information and updates regarding this vulnerability.
Is your project affected?
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.