Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11565: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric PowerChute Serial Shutdown

0
High
VulnerabilityCVE-2025-11565cvecve-2025-11565cwe-22
Published: Wed Nov 12 2025 (11/12/2025, 13:19:55 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: PowerChute Serial Shutdown

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST/REST/UpdateJRE request payload.

AI-Powered Analysis

AILast updated: 11/12/2025, 13:41:46 UTC

Technical Analysis

CVE-2025-11565 is a path traversal vulnerability (CWE-22) identified in Schneider Electric's PowerChute Serial Shutdown software, specifically affecting versions 1.3 and earlier. The vulnerability arises from improper limitation of pathname inputs in the handling of the POST/REST/UpdateJRE request payload by the web administration interface. A Web Admin user on the local network can exploit this flaw by tampering with the request payload to traverse directories outside the intended restricted directory, thereby gaining elevated system access. This elevated access could allow the attacker to execute unauthorized commands, modify system files, or disrupt normal operations. The vulnerability requires local network access and a user with Web Admin privileges, which limits remote exploitation but still poses a significant risk within internal networks. The CVSS 4.0 score of 7.3 reflects a high severity due to the potential impact on confidentiality, integrity, and availability, combined with the requirement for privileges and local access. No public exploits are known at this time, but the vulnerability is officially published and should be addressed promptly. The lack of available patches at the time of disclosure suggests organizations must implement interim mitigations until updates are released. Given the critical role of PowerChute Serial Shutdown in managing power and UPS systems, exploitation could lead to operational disruptions in data centers and industrial environments.

Potential Impact

For European organizations, the impact of CVE-2025-11565 can be significant, especially those relying on Schneider Electric's PowerChute Serial Shutdown for managing uninterruptible power supplies (UPS) and power infrastructure. Successful exploitation could lead to unauthorized elevated access, enabling attackers to alter system configurations, disrupt power management processes, or cause denial of service conditions. This could affect data center uptime, industrial control systems, and critical infrastructure operations, potentially leading to financial losses, operational downtime, and safety risks. Confidentiality could be compromised if attackers access sensitive system files or logs. Integrity is at risk due to possible unauthorized modifications, and availability could be impacted by service disruptions. The requirement for local network access and Web Admin privileges somewhat limits the threat to internal or segmented networks, but insider threats or lateral movement by attackers within networks remain concerns. European organizations with stringent regulatory requirements for operational resilience and cybersecurity must prioritize addressing this vulnerability to avoid compliance issues and reputational damage.

Mitigation Recommendations

1. Upgrade Schneider Electric PowerChute Serial Shutdown to the latest patched version once available to eliminate the vulnerability. 2. Restrict access to the web administration interface strictly to trusted administrators and secure it behind network segmentation or VPNs to prevent unauthorized local network access. 3. Implement strict network access controls and monitoring to detect and block anomalous POST/REST/UpdateJRE requests that could indicate exploitation attempts. 4. Enforce strong authentication and role-based access controls for Web Admin users to minimize the risk of compromised credentials. 5. Conduct regular audits of system logs and network traffic for signs of suspicious activity related to path traversal or unauthorized access attempts. 6. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) with custom rules to detect and block path traversal payloads targeting the affected endpoints. 7. Educate internal IT and security teams about the vulnerability and the importance of limiting local network access to critical management interfaces. 8. Develop and test incident response plans specifically addressing potential exploitation scenarios involving power management systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-10-09T15:10:36.405Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69148b1edc194680d69bd95b

Added to database: 11/12/2025, 1:26:54 PM

Last enriched: 11/12/2025, 1:41:46 PM

Last updated: 11/12/2025, 3:36:48 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats