CVE-2024-54448

The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:community:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:enterprise:*:*:*

History

07 Nov 2025, 02:21

Type Values Removed Values Added
References () https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html - () https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html - Third Party Advisory
First Time Logicaldoc logicaldoc
Logicaldoc
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:community:*:*:*

Information

Published : 2025-03-14 18:15

Updated : 2025-11-07 02:21


NVD link : CVE-2024-54448

Mitre link : CVE-2024-54448

CVE.ORG link : CVE-2024-54448


JSON object : View

Products Affected

logicaldoc

  • logicaldoc
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')