Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12546: Cross Site Scripting in LogicalDOC Community Edition

0
Medium
VulnerabilityCVE-2025-12546cvecve-2025-12546
Published: Fri Oct 31 2025 (10/31/2025, 18:32:05 UTC)
Source: CVE Database V5
Vendor/Project: LogicalDOC
Product: Community Edition

Description

A vulnerability was determined in LogicalDOC Community Edition up to 9.2.1. This affects an unknown part of the component API Key creation UI. This manipulation causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/31/2025, 18:50:14 UTC

Technical Analysis

CVE-2025-12546 identifies a cross-site scripting vulnerability in LogicalDOC Community Edition, specifically affecting versions 9.2.0 and 9.2.1. The vulnerability resides in the API Key creation UI component, where insufficient input sanitization allows attackers to inject malicious JavaScript code. This flaw enables remote attackers to execute scripts in the context of the victim’s browser, potentially leading to session hijacking, defacement, or unauthorized actions within the application. The attack vector requires no authentication but does require user interaction, such as clicking a crafted link or visiting a malicious page. The CVSS 4.0 score of 5.1 reflects a medium severity, considering the ease of exploitation (low complexity), lack of required privileges, but limited impact on confidentiality and integrity. The vendor was notified early but has not issued patches or responses, leaving users exposed. Although no active exploits have been reported, the public disclosure increases the likelihood of exploitation attempts. LogicalDOC Community Edition is an open-source document management system used by various organizations for managing digital documents, making this vulnerability relevant for environments relying on this software for secure document workflows.

Potential Impact

For European organizations, exploitation of this XSS vulnerability could lead to unauthorized access to user sessions, enabling attackers to perform actions on behalf of legitimate users or steal sensitive information accessible through the LogicalDOC interface. This could compromise document confidentiality and integrity, especially if API keys or administrative functions are targeted. While the vulnerability does not directly impact system availability, successful exploitation could facilitate further attacks or lateral movement within networks. Organizations handling sensitive or regulated documents (e.g., legal, financial, healthcare sectors) face increased risks of data breaches or compliance violations. The lack of vendor response and patches prolongs exposure, increasing the window for attackers to develop and deploy exploits. Given LogicalDOC’s use in collaborative and document-intensive environments, the impact could extend to multiple users and departments within affected organizations.

Mitigation Recommendations

European organizations should immediately review their use of LogicalDOC Community Edition versions 9.2.0 and 9.2.1 and consider the following specific mitigations: 1) Restrict access to the API Key creation UI to trusted administrators only, using network segmentation and access control lists to limit exposure. 2) Implement web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting LogicalDOC interfaces. 3) Educate users about the risks of clicking untrusted links or interacting with suspicious content related to LogicalDOC. 4) Monitor application logs for unusual activity around API key creation or user sessions to detect potential exploitation attempts. 5) If feasible, migrate to a newer or alternative document management solution that is actively maintained and patched. 6) Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 7) Regularly backup LogicalDOC data and configurations to enable recovery in case of compromise. 8) Engage with the LogicalDOC community or security forums to track any unofficial patches or mitigations until an official fix is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-10-31T13:10:09.009Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690504b88e4e31169790790f

Added to database: 10/31/2025, 6:49:28 PM

Last enriched: 10/31/2025, 6:50:14 PM

Last updated: 11/1/2025, 1:25:36 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats