{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T05:16:19.799","vulnerabilities":[{"cve":{"id":"CVE-2024-54448","sourceIdentifier":"disclosure@synopsys.com","published":"2025-03-14T18:15:30.617","lastModified":"2025-11-07T02:21:41.283","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC."},{"lang":"es","value":"Los atacantes pueden explotar la funcionalidad de Automation Scripting para ejecutar comandos arbitrarios en el sistema operativo subyacente. Para llevar a cabo el ataque, se requiere una cuenta con privilegios de administrador o con acceso explícito para usar Automation Scripting. Esta vulnerabilidad permitiría a un atacante ejecutar comandos de su elección en el sistema operativo subyacente del servidor web que ejecuta LogicalDOC."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@synopsys.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"disclosure@synopsys.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:community:*:*:*","versionEndExcluding":"9.1","matchCriteriaId":"1C1EAC9D-2C12-4E1D-82F2-FAECA0A8A0F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"9.1","matchCriteriaId":"CE73C91A-BA24-4040-95BF-75DDA743A43E"}]}]}],"references":[{"url":"https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html","source":"disclosure@synopsys.com","tags":["Third Party Advisory"]}]}}]}