CVE-2019-25258

LogicalDOC Enterprise 7.7.4 contains multiple post-authentication file disclosure vulnerabilities that allow attackers to read arbitrary files through unverified 'suffix' and 'fileVersion' parameters. Attackers can exploit directory traversal techniques in /thumbnail and /convertpdf endpoints to access sensitive system files like win.ini and /etc/passwd by manipulating path traversal sequences.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:logicaldoc:logicaldoc:7.1.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.4.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.5.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.6.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.6.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:7.7.4:*:*:*:enterprise:*:*:*

History

No history.

Information

Published : 2025-12-24 20:15

Updated : 2026-01-09 20:50


NVD link : CVE-2019-25258

Mitre link : CVE-2019-25258

CVE.ORG link : CVE-2019-25258


JSON object : View

Products Affected

logicaldoc

  • logicaldoc
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')