Cyber Posture

CVE-2025-54317

High

Published: 20 July 2025

Published
20 July 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0032 55.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-54317 is a high-severity Relative Path Traversal (CWE-23) vulnerability in Logpoint (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 44.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely identification, reporting, and patching of the path traversal flaw in Logpoint Layout Template creation, as fixed in version 7.6.0.

prevent

Prevents path traversal exploitation by validating user-supplied paths during Layout Template creation to block access to unauthorized file system locations leading to RCE.

prevent

Limits the attack surface by enforcing least privilege, reducing the number of users with operator privileges required to exploit the path traversal vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Path traversal in public-facing Logpoint web app directly enables remote exploitation for RCE via web shell deployment.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue was discovered in Logpoint before 7.6.0. An attacker with operator privileges can exploit a path traversal vulnerability when creating a Layout Template, which can lead to remote code execution (RCE).

Deeper analysisAI

CVE-2025-54317 is a path traversal vulnerability (CWE-23) affecting Logpoint versions before 7.6.0. The flaw exists in the Layout Template creation functionality, where an attacker with operator privileges can manipulate paths to access unauthorized locations, ultimately leading to remote code execution (RCE). Published on 2025-07-20, it carries a CVSS v3.1 base score of 8.4 (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.

Exploitation requires an authenticated attacker possessing operator privileges, accessible over the network with low attack complexity but necessitating some user interaction. Upon successful exploitation, the attacker gains elevated privileges in a changed scope, achieving high impacts across confidentiality, integrity, and availability, including arbitrary code execution on the Logpoint server.

Logpoint's security advisories detail mitigation through upgrading to version 7.6.0 or later, which addresses the path traversal issue in Layout Templates. Practitioners should consult the primary advisory at https://servicedesk.logpoint.com/hc/en-us/articles/28685507675549-Path-Traversal-in-Layout-Templates-Allows-Remote-Code-Execution and the Product Security section at https://servicedesk.logpoint.com/hc/en-us/sections/7201103730845-Product-Security for patch deployment guidance and additional remediation steps.

Details

CWE(s)

Affected Products

Logpoint
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-30345Shared CWE-23
CVE-2025-23410Shared CWE-23
CVE-2026-26362Shared CWE-23
CVE-2024-54449Shared CWE-23
CVE-2025-26349Shared CWE-23
CVE-2025-25130Shared CWE-23
CVE-2026-33494Shared CWE-23
CVE-2026-25057Shared CWE-23
CVE-2024-56340Shared CWE-23
CVE-2025-7619Shared CWE-23

References