CVE-2025-11565: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric PowerChute™ Serial Shutdown
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST /REST/UpdateJRE request payload.
AI Analysis
Technical Summary
CVE-2025-11565 is a path traversal vulnerability classified under CWE-22 found in Schneider Electric's PowerChute™ Serial Shutdown software, specifically affecting versions 1.3 and earlier. The vulnerability arises due to improper validation and limitation of pathname inputs in the POST /REST/UpdateJRE API endpoint. A Web Admin user on the local network can tamper with the request payload to traverse directories outside the intended restricted path, potentially accessing or modifying sensitive files. This can lead to elevated system privileges, allowing attackers to execute unauthorized actions or escalate their access level. The CVSS 4.0 base score is 7.3 (high), reflecting the requirement for local network access (AV:L), high attack complexity (AC:H), and the need for low privileges (PR:L) but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability with high scope and impact metrics. No patches or exploits are currently publicly available, but the risk remains significant due to the critical role of PowerChute in managing power shutdowns and system stability. The vulnerability's exploitation could disrupt power management processes, leading to potential downtime or damage to connected systems. The flaw is particularly concerning in industrial, data center, and critical infrastructure environments where PowerChute is deployed.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those in sectors relying heavily on Schneider Electric's power management solutions, such as manufacturing, energy, telecommunications, and data centers. Exploitation could lead to unauthorized access and control over power management systems, potentially causing improper shutdowns, data loss, or operational disruptions. This could affect business continuity and safety, particularly in critical infrastructure environments. Given the local network access requirement, internal threat actors or attackers who gain network foothold could leverage this vulnerability to escalate privileges and move laterally. The impact on confidentiality, integrity, and availability is high, with potential cascading effects on connected systems and services. European organizations must consider the regulatory implications of such a compromise, including GDPR concerns if personal or sensitive data is affected indirectly through system disruptions.
Mitigation Recommendations
1. Restrict network access to the PowerChute management interface strictly to trusted administrators and secure management VLANs to prevent unauthorized local network access. 2. Implement network segmentation and firewall rules to isolate PowerChute devices from general user networks. 3. Monitor and log POST /REST/UpdateJRE requests for unusual or malformed payloads indicative of path traversal attempts. 4. Employ application-layer filtering or Web Application Firewalls (WAFs) that can detect and block path traversal patterns in HTTP requests. 5. Coordinate with Schneider Electric for timely patch releases and apply updates as soon as they become available. 6. Conduct regular security assessments and penetration tests focusing on power management systems to identify and remediate similar vulnerabilities. 7. Educate administrators on the risks of local network access and enforce strong authentication and access controls for Web Admin users. 8. Maintain offline backups and incident response plans to quickly recover from potential exploitation impacts.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Spain, Poland, Sweden, Switzerland
CVE-2025-11565: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric PowerChute™ Serial Shutdown
Description
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST /REST/UpdateJRE request payload.
AI-Powered Analysis
Technical Analysis
CVE-2025-11565 is a path traversal vulnerability classified under CWE-22 found in Schneider Electric's PowerChute™ Serial Shutdown software, specifically affecting versions 1.3 and earlier. The vulnerability arises due to improper validation and limitation of pathname inputs in the POST /REST/UpdateJRE API endpoint. A Web Admin user on the local network can tamper with the request payload to traverse directories outside the intended restricted path, potentially accessing or modifying sensitive files. This can lead to elevated system privileges, allowing attackers to execute unauthorized actions or escalate their access level. The CVSS 4.0 base score is 7.3 (high), reflecting the requirement for local network access (AV:L), high attack complexity (AC:H), and the need for low privileges (PR:L) but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability with high scope and impact metrics. No patches or exploits are currently publicly available, but the risk remains significant due to the critical role of PowerChute in managing power shutdowns and system stability. The vulnerability's exploitation could disrupt power management processes, leading to potential downtime or damage to connected systems. The flaw is particularly concerning in industrial, data center, and critical infrastructure environments where PowerChute is deployed.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those in sectors relying heavily on Schneider Electric's power management solutions, such as manufacturing, energy, telecommunications, and data centers. Exploitation could lead to unauthorized access and control over power management systems, potentially causing improper shutdowns, data loss, or operational disruptions. This could affect business continuity and safety, particularly in critical infrastructure environments. Given the local network access requirement, internal threat actors or attackers who gain network foothold could leverage this vulnerability to escalate privileges and move laterally. The impact on confidentiality, integrity, and availability is high, with potential cascading effects on connected systems and services. European organizations must consider the regulatory implications of such a compromise, including GDPR concerns if personal or sensitive data is affected indirectly through system disruptions.
Mitigation Recommendations
1. Restrict network access to the PowerChute management interface strictly to trusted administrators and secure management VLANs to prevent unauthorized local network access. 2. Implement network segmentation and firewall rules to isolate PowerChute devices from general user networks. 3. Monitor and log POST /REST/UpdateJRE requests for unusual or malformed payloads indicative of path traversal attempts. 4. Employ application-layer filtering or Web Application Firewalls (WAFs) that can detect and block path traversal patterns in HTTP requests. 5. Coordinate with Schneider Electric for timely patch releases and apply updates as soon as they become available. 6. Conduct regular security assessments and penetration tests focusing on power management systems to identify and remediate similar vulnerabilities. 7. Educate administrators on the risks of local network access and enforce strong authentication and access controls for Web Admin users. 8. Maintain offline backups and incident response plans to quickly recover from potential exploitation impacts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- schneider
- Date Reserved
- 2025-10-09T15:10:36.405Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69148b1edc194680d69bd95b
Added to database: 11/12/2025, 1:26:54 PM
Last enriched: 11/19/2025, 2:30:59 PM
Last updated: 12/27/2025, 8:32:01 PM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14177: CWE-125 Out-of-bounds Read in PHP Group PHP
MediumCVE-2025-14180: CWE-476 NULL Pointer Dereference in PHP Group PHP
HighCVE-2025-14178: CWE-787 Out-of-bounds Write in PHP Group PHP
MediumCVE-2025-15109: Unrestricted Upload in jackq XCMS
MediumCVE-2025-15108: Use of Hard-coded Cryptographic Key in PandaXGO PandaX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.