There is a reflected cross-site scripting (XSS) within JSP files used to control application appearance. An unauthenticated attacker could deceive a user into clicking a crafted link to trigger the vulnerability. Stealing the session cookie is not possible due to cookie security flags, however the XSS may be used to induce a victim to perform on-site requests without their knowledge.
This vulnerability only affects LogicalDOC Enterprise.
References
| Link | Resource |
|---|---|
| https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html | Third Party Advisory |
Configurations
History
07 Nov 2025, 02:19
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:logicaldoc:logicaldoc:8.9.3:*:*:*:enterprise:*:*:* | |
| Summary |
|
|
| References | () https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html - Third Party Advisory | |
| First Time |
Logicaldoc logicaldoc
Logicaldoc |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
14 Mar 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-14 18:15
Updated : 2025-11-07 02:19
NVD link : CVE-2024-12020
Mitre link : CVE-2024-12020
CVE.ORG link : CVE-2024-12020
JSON object : View
Products Affected
logicaldoc
- logicaldoc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
