CVE-2026-25925

7.8 HIGH

📋 TL;DR

PowerDocu versions before 2.4.0 contain a critical deserialization vulnerability where the application blindly trusts the $type property in JSON files within Flow or App packages. This allows attackers to instantiate arbitrary .NET objects and execute remote code. Users running PowerDocu versions prior to 2.4.0 are affected.

💻 Affected Systems

Products:
  • PowerDocu
Versions: All versions prior to 2.4.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when processing JSON files within Flow or App packages, which is a core functionality of PowerDocu.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution as the user running PowerDocu, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Remote code execution with the privileges of the PowerDocu user, enabling file system access, credential harvesting, and persistence mechanisms.

🟢

If Mitigated

Limited impact if PowerDocu runs with minimal privileges and network access is restricted, though local code execution remains possible.

🌐 Internet-Facing: MEDIUM - Exploitation requires the attacker to supply a malicious JSON file, which could be delivered via phishing or compromised repositories.
🏢 Internal Only: HIGH - Internal users with access to PowerDocu could exploit this vulnerability to escalate privileges or move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to craft a malicious JSON file with a malicious $type property and have it processed by PowerDocu. No authentication bypass is needed beyond file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.0

Vendor Advisory: https://github.com/modery/PowerDocu/security/advisories/GHSA-m8j2-5jr7-2jpw

Restart Required: Yes

Instructions:

1. Download PowerDocu version 2.4.0 or later from the official GitHub releases page. 2. Uninstall the previous version. 3. Install the new version. 4. Restart the system to ensure all processes use the updated version.

🔧 Temporary Workarounds

Restrict JSON file sources

windows

Only allow PowerDocu to process JSON files from trusted, verified sources. Implement strict access controls on directories containing Flow or App packages.

Run with minimal privileges

windows

Configure PowerDocu to run with a non-administrative, low-privilege user account to limit the impact of successful exploitation.

🧯 If You Can't Patch

  • Discontinue use of PowerDocu for processing untrusted JSON files until patched.
  • Isolate PowerDocu installations on segmented networks with strict egress filtering.

🔍 How to Verify

Check if Vulnerable:

Check the PowerDocu version by running the application and viewing the version in the GUI or checking the executable properties. Versions below 2.4.0 are vulnerable.

Check Version:

PowerDocu.exe --version (if supported) or check file properties in Windows Explorer.

Verify Fix Applied:

After updating, confirm the version is 2.4.0 or higher using the same method. Test with a known safe JSON file to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from PowerDocu.exe
  • Errors or crashes in PowerDocu logs related to JSON parsing or deserialization

Network Indicators:

  • Unexpected outbound connections from PowerDocu.exe to external IPs

SIEM Query:

Process Creation where Image contains 'PowerDocu.exe' and CommandLine contains unusual arguments or file paths

🔗 References

📤 Share & Export