CVE-2025-5296
BaseFortify
Publication date: 2025-08-18
Last updated on: 2025-08-18
Assigner: Schneider Electric SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| schneider_electric | powerlogic_p7 | * |
| schneider_electric | powerlogic_p5 | * |
| schneider_electric | exlhoist_configuration_software | * |
| schneider_electric | ecostruxure_automation_expert | * |
| schneider_electric | easergy_micom_p40 | * |
| schneider_electric | easergy_studio | * |
| schneider_electric | somove | * |
| schneider_electric | zeliosoft_2 | * |
| schneider_electric | harmony_xb5s_soft | * |
| schneider_electric | easergy_micom_p30 | * |
| schneider_electric | schneider_electric_software_update | 3.0.12 |
| schneider_electric | bess_ansi | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a CWE-59: Improper Link Resolution Before File Access ('Link Following') issue. It allows a low-privileged attacker to tamper with the installation folder, causing arbitrary data to be written to protected locations. This can lead to escalation of privilege, arbitrary file corruption, exposure of application and system information, or persistent denial of service.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker with low privileges to escalate their privileges, corrupt important files arbitrarily, expose sensitive application and system information, or cause a persistent denial of service, potentially disrupting normal operations.