Vulnerability Details CVE-2024-54448
The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 32.9%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2024-54448
-
cpe:2.3:a:logicaldoc:logicaldoc:3.6
-
cpe:2.3:a:logicaldoc:logicaldoc:4
-
cpe:2.3:a:logicaldoc:logicaldoc:4.0.1
-
cpe:2.3:a:logicaldoc:logicaldoc:4.5
-
cpe:2.3:a:logicaldoc:logicaldoc:4.5.2
-
cpe:2.3:a:logicaldoc:logicaldoc:4.6.1
-
cpe:2.3:a:logicaldoc:logicaldoc:5.0.1
-
cpe:2.3:a:logicaldoc:logicaldoc:5.1.2
-
cpe:2.3:a:logicaldoc:logicaldoc:5.2.0
-
cpe:2.3:a:logicaldoc:logicaldoc:5.2.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6
-
cpe:2.3:a:logicaldoc:logicaldoc:6.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.2.4
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.4
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.5
-
cpe:2.3:a:logicaldoc:logicaldoc:6.4
-
cpe:2.3:a:logicaldoc:logicaldoc:6.4.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.4.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.5
-
cpe:2.3:a:logicaldoc:logicaldoc:6.5.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.5.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.6
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7
-
cpe:2.3:a:logicaldoc:logicaldoc:7.0.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.2.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.5
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.6
-
cpe:2.3:a:logicaldoc:logicaldoc:8.0
-
cpe:2.3:a:logicaldoc:logicaldoc:8.1
-
cpe:2.3:a:logicaldoc:logicaldoc:8.1.1
-
cpe:2.3:a:logicaldoc:logicaldoc:8.2.1
-
cpe:2.3:a:logicaldoc:logicaldoc:8.3.0
-
cpe:2.3:a:logicaldoc:logicaldoc:8.7.3
-
cpe:2.3:a:logicaldoc:logicaldoc:8.8.2