प्लेटफ़ॉर्म
other
घटक
logicaldoc-enterprise
में ठीक किया गया
7.7.5
7.7.4
7.7.3
7.7.2
7.6.5
7.6.3
7.5.2
7.4.3
7.1.2
CVE-2019-25258 describes a directory traversal vulnerability discovered in LogicalDOC Enterprise. This vulnerability allows authenticated attackers to read arbitrary files on the system by manipulating parameters within the /thumbnail and /convertpdf endpoints. The vulnerability impacts versions 7.1.1 through 7.7.4, and a fix is available in version 7.7.5.
Successful exploitation of CVE-2019-25258 allows an attacker to bypass access controls and read sensitive system files. By crafting malicious requests with carefully constructed path traversal sequences in the 'suffix' and 'fileVersion' parameters, an attacker can access files outside of the intended directories. This could include critical configuration files like win.ini or /etc/passwd on Linux systems, potentially exposing usernames, passwords, and other sensitive information. The ability to read system files could lead to further compromise of the LogicalDOC Enterprise server and potentially the entire network.
CVE-2019-25258 was published on December 24, 2025. There is no indication of active exploitation or inclusion in the CISA KEV catalog at this time. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it relatively straightforward to exploit given post-authentication access.
Organizations utilizing LogicalDOC Enterprise for document management, particularly those with older versions (7.1.1 – 7.7.4), are at risk. Shared hosting environments where multiple users have access to the LogicalDOC Enterprise instance are also particularly vulnerable, as a compromised user account could be leveraged to exploit this vulnerability.
• windows / other: Monitor event logs for unusual file access attempts, particularly targeting files outside of the LogicalDOC Enterprise application directory. Use Sysinternals Process Monitor to observe file system activity related to the LogicalDOC Enterprise process.
• linux / server: Examine auditd logs for attempts to access files outside the expected directories. Use lsof to identify processes accessing sensitive system files.
• generic web: Inspect access logs for requests to /thumbnail and /convertpdf endpoints with unusual or excessively long parameters. Look for patterns indicative of path traversal attempts.
disclosure
एक्सप्लॉइट स्थिति
EPSS
1.88% (83% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2019-25258 is to upgrade LogicalDOC Enterprise to version 7.7.5 or later, which contains the necessary fixes. If an immediate upgrade is not possible, consider implementing temporary workarounds such as restricting access to the /thumbnail and /convertpdf endpoints to trusted users only. Web Application Firewalls (WAFs) can be configured to detect and block requests containing suspicious path traversal sequences. Monitor access logs for unusual file access patterns, particularly requests targeting the /thumbnail and /convertpdf endpoints with unusual parameters.
Actualizar LogicalDOC Enterprise a una versión posterior a 7.7.4 que corrija las vulnerabilidades de recorrido de directorios. Consultar el sitio web del proveedor para obtener la última versión y las instrucciones de actualización.
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2019-25258 is a vulnerability allowing authenticated attackers to read arbitrary files on a LogicalDOC Enterprise server by manipulating parameters in specific endpoints.
You are affected if you are running LogicalDOC Enterprise versions 7.1.1 through 7.7.4. Upgrade to 7.7.5 or later to resolve the issue.
Upgrade LogicalDOC Enterprise to version 7.7.5 or later. As a temporary workaround, restrict access to the vulnerable endpoints and monitor access logs.
There is currently no evidence of active exploitation, but the vulnerability is relatively easy to exploit given post-authentication access.
Refer to the LogicalDOC security advisories page for the latest information and updates regarding this vulnerability.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।