Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 28 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:modery:powerdocu:*:*:*:*:*:*:*:* |
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modery
Modery powerdocu |
|
| Vendors & Products |
Modery
Modery powerdocu |
Mon, 09 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PowerDocu contains a Windows GUI executable to perform technical documentations. Prior to 2.4.0, PowerDocu contains a critical security vulnerability in how it parses JSON files within Flow or App packages. The application blindly trusts the $type property in JSON files, allowing an attacker to instantiate arbitrary .NET objects and execute code. This vulnerability is fixed in 2.4.0. | |
| Title | PowerDocu Affected by Remote Code Execution via Insecure Deserialization | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-11T21:22:45.286Z
Reserved: 2026-02-09T16:22:17.785Z
Link: CVE-2026-25925
Updated: 2026-02-11T21:22:42.755Z
Status : Analyzed
Published: 2026-02-09T22:16:04.607
Modified: 2026-02-28T00:13:57.360
Link: CVE-2026-25925
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:15:27Z