CVE-2026-25925

Source
https://cve.org/CVERecord?id=CVE-2026-25925
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25925.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25925
Aliases
  • GHSA-m8j2-5jr7-2jpw
Published
2026-02-09T21:59:08.335Z
Modified
2026-03-14T12:48:02.721235Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
PowerDocu Affected by Remote Code Execution via Insecure Deserialization
Details

PowerDocu contains a Windows GUI executable to perform technical documentations. Prior to 2.4.0, PowerDocu contains a critical security vulnerability in how it parses JSON files within Flow or App packages. The application blindly trusts the $type property in JSON files, allowing an attacker to instantiate arbitrary .NET objects and execute code. This vulnerability is fixed in 2.4.0.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-502"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25925.json"
}
References

Affected packages

Git / github.com/modery/PowerDocu

Affected ranges

Type
GIT
Repo
https://github.com/modery/PowerDocu
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.4.0"
        }
    ]
}
Type
GIT
Repo
https://github.com/modery/powerdocu
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v-0.*
v-0.1.0-alpha
v-0.2.0-alpha
v-0.3.0
v-0.4.0
v-0.4.1
v-0.5.0
v-0.6.0
v-0.6.1
v-0.7.0
v-0.8.0
v-0.9.0
v-0.9.1
v-1.*
v-1.0.0
v-1.1.0
v-1.2.0
v-1.2.1
v-1.2.2
v-1.2.3
v-1.2.4
v-2.*
v-2.0.0
v-2.0.1
v-2.1.0
v-2.2.0
v-2.3.0
v.*
v.0.10.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25925.json"