CVE-2023-25266
moderate-risk
Published 2023-02-28
An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).
Do I need to act?
~
5.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Tornado
Affected Vendors
References (4)
44
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
9/34 · Low
Exposure
5/34 · Minimal