Lexicom Cleo Lexicom

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Cleo Lexicom.

By the Year

In 2026 there have been 0 vulnerabilities in Cleo Lexicom. Lexicom did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 2 9.80
2023 0 0.00
2022 0 0.00
2021 2 7.55

It may take a day or so for new Lexicom vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cleo Lexicom Security Vulnerabilities

Cleo Harmony, VLTrader, and LexiCom Remote Code Execution via Autorun Directory
CVE-2024-55956 9.8 - Critical - December 13, 2024

In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.

Command Injection

Unrestricted File UL/DR in Cleo Harmony, VLTrader, LexiCom <5.8.0.21 (RCE)
CVE-2024-50623 9.8 - Critical - October 28, 2024

In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.

Unrestricted File Upload

An issue was discovered in Cleo LexiCom 5.5.0.0
CVE-2021-33577 5.3 - Medium - June 18, 2021

An issue was discovered in Cleo LexiCom 5.5.0.0. The requirement for the sender of an AS2 message to identify themselves (via encryption and signing of the message) can be bypassed by changing the Content-Type of the message to text/plain.

An issue was discovered in Cleo LexiCom 5.5.0.0
CVE-2021-33576 9.8 - Critical - June 18, 2021

An issue was discovered in Cleo LexiCom 5.5.0.0. Within the AS2 message, the sender can specify a filename. This filename can include path-traversal characters, allowing the file to be written to an arbitrary location on disk.

Directory traversal

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cleo Lexicom or by Cleo? Click the Watch button to subscribe.

Cleo
Vendor

Cleo Lexicom
Product

subscribe