Browse all 4 CVE security advisories affecting docjojo. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Docjojo primarily develops document management and collaboration software, serving organizations requiring secure file handling and workflow automation. Historically, vulnerabilities associated with this software include remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and access control flaws. Security assessments have revealed weaknesses in file parsing mechanisms and session management, though no major public incidents have been documented. The product maintains a moderate CVE count with four recorded vulnerabilities, suggesting manageable but persistent security challenges that require ongoing attention to input sanitization and permission enforcement.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-13404 | atec Duplicate Page & Post <= 1.2.20 - Missing Authorization to Authenticated (Contributor+) Arbitrary Post Duplication and Data Exposure — atec Duplicate Page & PostCWE-862 | 5.3 | Medium | 2025-11-25 |
| CVE-2025-9517 | atec Debug <= 1.2.22 - Authenticated (Administrator+) Remote Code Execution — atec DebugCWE-94 | 7.2 | High | 2025-09-04 |
| CVE-2025-9516 | atec Debug <= 1.2.22 - Authenticated (Administrator+) Arbitrary File Read — atec DebugCWE-36 | 4.9 | Medium | 2025-09-04 |
| CVE-2025-9518 | atec Debug <= 1.2.22 - Authenticated (Administrator+) Arbitrary File Deletion — atec DebugCWE-36 | 7.2 | High | 2025-09-04 |
This page lists every published CVE security advisory associated with docjojo. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.