CVE-2025-54317
Published: 20 July 2025
Summary
CVE-2025-54317 is a high-severity Relative Path Traversal (CWE-23) vulnerability in Logpoint (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 44.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the CVE by requiring timely identification, reporting, and patching of the path traversal flaw in Logpoint Layout Template creation, as fixed in version 7.6.0.
Prevents path traversal exploitation by validating user-supplied paths during Layout Template creation to block access to unauthorized file system locations leading to RCE.
Limits the attack surface by enforcing least privilege, reducing the number of users with operator privileges required to exploit the path traversal vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing Logpoint web app directly enables remote exploitation for RCE via web shell deployment.
NVD Description
An issue was discovered in Logpoint before 7.6.0. An attacker with operator privileges can exploit a path traversal vulnerability when creating a Layout Template, which can lead to remote code execution (RCE).
Deeper analysisAI
CVE-2025-54317 is a path traversal vulnerability (CWE-23) affecting Logpoint versions before 7.6.0. The flaw exists in the Layout Template creation functionality, where an attacker with operator privileges can manipulate paths to access unauthorized locations, ultimately leading to remote code execution (RCE). Published on 2025-07-20, it carries a CVSS v3.1 base score of 8.4 (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.
Exploitation requires an authenticated attacker possessing operator privileges, accessible over the network with low attack complexity but necessitating some user interaction. Upon successful exploitation, the attacker gains elevated privileges in a changed scope, achieving high impacts across confidentiality, integrity, and availability, including arbitrary code execution on the Logpoint server.
Logpoint's security advisories detail mitigation through upgrading to version 7.6.0 or later, which addresses the path traversal issue in Layout Templates. Practitioners should consult the primary advisory at https://servicedesk.logpoint.com/hc/en-us/articles/28685507675549-Path-Traversal-in-Layout-Templates-Allows-Remote-Code-Execution and the Product Security section at https://servicedesk.logpoint.com/hc/en-us/sections/7201103730845-Product-Security for patch deployment guidance and additional remediation steps.
Details
- CWE(s)