The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html |
![]() ![]() |
History
Tue, 18 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC. | |
Title | Remote Code Execution (RCE) via Automation Scripting | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: BlackDuck
Published: 2025-03-14T18:01:25.311Z
Updated: 2025-03-18T16:36:58.362Z
Reserved: 2024-12-02T14:24:46.526Z
Link: CVE-2024-54448

Updated: 2025-03-17T16:20:51.453Z

Status : Received
Published: 2025-03-14T18:15:30.617
Modified: 2025-03-14T18:15:30.617
Link: CVE-2024-54448

No data.