CVE-2026-22615
Received Received - Intake
XML Injection in Eaton IPP Allows Arbitrary Command Execution

Publication date: 2026-04-16

Last updated on: 2026-04-22

Assigner: Eaton

Description
Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is possible for an attacker with admin privileges and access to the local system to inject malicious code resulting in arbitrary command execution.Β This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download centre.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-16
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eaton intelligent_power_protector to 2.00 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML components. An attacker who has administrative privileges and local system access can exploit this flaw to inject malicious code, which can lead to arbitrary command execution on the affected system.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with admin rights and local access to execute arbitrary commands on your system. This could lead to unauthorized actions such as modifying system settings, accessing sensitive data, or disrupting normal operations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Eaton Intelligent Power Protector (IPP) software to the latest version available from the Eaton download centre where the security issue has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart