Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25925: CWE-502: Deserialization of Untrusted Data in modery PowerDocu

0
High
VulnerabilityCVE-2026-25925cvecve-2026-25925cwe-502
Published: Mon Feb 09 2026 (02/09/2026, 21:59:08 UTC)
Source: CVE Database V5
Vendor/Project: modery
Product: PowerDocu

Description

CVE-2026-25925 is a high-severity deserialization vulnerability in modery PowerDocu versions prior to 2. 4. 0. The application improperly trusts the $type property in JSON files used within Flow or App packages, enabling attackers to instantiate arbitrary . NET objects and execute code remotely. Exploitation requires local access and user interaction but can lead to full confidentiality, integrity, and availability compromise. No known exploits are currently in the wild, and the vulnerability is fixed in version 2. 4. 0. European organizations using affected versions should prioritize upgrading and implement strict input validation and monitoring.

AI-Powered Analysis

AILast updated: 02/09/2026, 22:30:37 UTC

Technical Analysis

CVE-2026-25925 is a critical deserialization vulnerability affecting modery PowerDocu, a Windows GUI application used for technical documentation. Versions prior to 2.4.0 improperly parse JSON files within Flow or App packages by blindly trusting the $type property. This property allows the JSON deserializer to instantiate arbitrary .NET objects during deserialization. An attacker who can supply a crafted JSON file can exploit this flaw to execute arbitrary code within the context of the application. The vulnerability stems from CWE-502: Deserialization of Untrusted Data, a common and dangerous flaw in applications that deserialize data without proper validation or restrictions. The CVSS 3.1 base score is 7.8, with vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability presents a significant risk due to the potential for remote code execution if an attacker can trick a user into opening a malicious package. The issue is resolved in PowerDocu version 2.4.0, which presumably implements safer deserialization practices or restricts the $type property usage. The vulnerability affects organizations that use PowerDocu for technical documentation workflows, especially those integrating third-party or user-generated JSON packages.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the confidentiality, integrity, and availability of systems running affected versions of PowerDocu. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to data theft, unauthorized access to sensitive technical documentation, or disruption of documentation workflows critical for operational continuity. Organizations in sectors such as manufacturing, engineering, and software development that rely heavily on PowerDocu for documentation may face operational delays or intellectual property exposure. Given the local attack vector and requirement for user interaction, the threat is more likely in environments where users handle untrusted or external JSON packages. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. European organizations with strict compliance requirements around data protection and operational security must consider this vulnerability a high priority to mitigate.

Mitigation Recommendations

1. Upgrade all installations of modery PowerDocu to version 2.4.0 or later immediately to apply the official fix. 2. Implement strict controls on the sources of JSON Flow or App packages, ensuring only trusted and verified packages are used. 3. Employ application whitelisting or sandboxing to limit the execution context of PowerDocu, reducing the impact of potential code execution. 4. Educate users to avoid opening untrusted or unsolicited documentation packages, emphasizing the risk of malicious JSON content. 5. Monitor logs and system behavior for unusual activity related to PowerDocu processes, especially around package loading events. 6. Where possible, disable or restrict features that allow importing or loading external JSON packages if not essential. 7. Conduct regular security assessments and penetration testing focusing on deserialization and input validation weaknesses in documentation tools. 8. Collaborate with vendors to receive timely updates and security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T16:22:17.785Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a5caf4b57a58fa174d53d

Added to database: 2/9/2026, 10:16:15 PM

Last enriched: 2/9/2026, 10:30:37 PM

Last updated: 2/9/2026, 11:16:29 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats