Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12547: Improper Restriction of Excessive Authentication Attempts in LogicalDOC Community Edition

0
Medium
VulnerabilityCVE-2025-12547cvecve-2025-12547
Published: Fri Oct 31 2025 (10/31/2025, 18:32:08 UTC)
Source: CVE Database V5
Vendor/Project: LogicalDOC
Product: Community Edition

Description

A vulnerability was identified in LogicalDOC Community Edition up to 9.2.1. This vulnerability affects unknown code of the file /login.jsp of the component Admin Login Page. Such manipulation leads to improper restriction of excessive authentication attempts. The attack can be executed remotely. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/31/2025, 18:50:03 UTC

Technical Analysis

CVE-2025-12547 identifies a vulnerability in LogicalDOC Community Edition up to version 9.2.1, specifically in the /login.jsp file of the Admin Login Page component. The flaw is an improper restriction of excessive authentication attempts, which means the system does not adequately limit the number of login attempts an attacker can make remotely. This weakness can be exploited to perform brute-force attacks against administrator credentials, potentially leading to unauthorized access. The vulnerability is remotely exploitable without requiring any privileges or user interaction, but the attack complexity is high, making exploitation difficult. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the moderate impact on confidentiality with no impact on integrity or availability. The vulnerability does not require authentication and does not affect system components beyond the login page. Although a public exploit is available, there are no reports of active exploitation in the wild. The vendor was contacted but has not issued any response or patch, increasing the risk for users who have not implemented compensating controls. LogicalDOC Community Edition is an open-source document management system, often used by organizations to manage digital documents and workflows. The vulnerability could allow attackers to gain administrative access, potentially exposing sensitive documents and internal information.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality of sensitive documents managed within LogicalDOC Community Edition. Unauthorized administrative access could lead to data breaches, exposure of intellectual property, and compromise of internal workflows. Since LogicalDOC is used in various sectors including legal, governmental, and corporate environments, the impact could be significant where sensitive or regulated data is stored. The lack of vendor response and patch availability increases the risk exposure. Although exploitation complexity is high, determined attackers with sufficient resources could leverage the public exploit to gain access. This could lead to compliance violations under GDPR if personal data is exposed. The vulnerability does not directly affect system availability or integrity but could be a stepping stone for further attacks within compromised networks.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement specific mitigations: 1) Deploy Web Application Firewalls (WAFs) with rules to detect and block brute-force login attempts targeting /login.jsp. 2) Implement network-level rate limiting and IP blacklisting to restrict repeated login attempts from the same source. 3) Enforce strong password policies and consider multi-factor authentication (MFA) for administrator accounts if supported by LogicalDOC or via external authentication proxies. 4) Monitor login logs closely for unusual authentication patterns and failed login spikes. 5) Isolate LogicalDOC servers within segmented network zones to limit lateral movement if compromised. 6) Consider temporary disabling remote admin login access or restricting it to trusted IP addresses. 7) Regularly back up document repositories and configuration to enable recovery in case of compromise. 8) Stay alert for vendor updates or community patches and apply them promptly once available. 9) Educate administrators on recognizing phishing or social engineering attempts that could facilitate credential theft. These targeted measures go beyond generic advice and address the specific attack vector and environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-10-31T13:10:18.607Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690504b88e4e311697907915

Added to database: 10/31/2025, 6:49:28 PM

Last enriched: 10/31/2025, 6:50:03 PM

Last updated: 11/1/2025, 1:25:39 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats