Skip to main content

CVE-2025-50125: CWE-918 Server-Side Request Forgery (SSRF) in Schneider Electric EcoStruxure™ IT Data Center Expert

Medium
VulnerabilityCVE-2025-50125cvecve-2025-50125cwe-918
Published: Fri Jul 11 2025 (07/11/2025, 10:45:49 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure™ IT Data Center Expert

Description

A CWE-918: Server-Side Request Forgery (SSRF) vulnerability exists that could cause unauthenticated remote code execution when the server is accessed via the network with knowledge of hidden URLs and manipulation of host request header.

AI-Powered Analysis

AILast updated: 07/18/2025, 21:19:53 UTC

Technical Analysis

CVE-2025-50125 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting Schneider Electric's EcoStruxure™ IT Data Center Expert version 8.3. SSRF vulnerabilities occur when an attacker can manipulate a server to make unintended requests to internal or external systems, potentially bypassing network access controls. In this case, the vulnerability allows unauthenticated remote code execution by exploiting hidden URLs and manipulating the host request header. The attacker does not require prior authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS 4.0 base score is 6.3 (medium severity), reflecting network attack vector, low complexity, no privileges required, no user interaction, and partial impacts on confidentiality and integrity. The vulnerability could allow attackers to execute arbitrary code remotely, potentially compromising the affected server and any connected infrastructure. No known exploits are currently reported in the wild, and no patches have been released yet. Given the nature of EcoStruxure IT Data Center Expert as a critical data center infrastructure management tool, exploitation could lead to significant operational disruptions and data breaches.

Potential Impact

For European organizations, the impact of this SSRF vulnerability could be substantial, especially for those relying on Schneider Electric's EcoStruxure IT Data Center Expert to manage critical data center operations. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over data center management systems. This could result in disruption of data center operations, unauthorized access to sensitive infrastructure data, and potential lateral movement within the network. The confidentiality and integrity of operational data could be compromised, affecting service availability and reliability. Given the increasing reliance on digital infrastructure and data centers across Europe, such a vulnerability could impact sectors including finance, healthcare, manufacturing, and government services, where data center uptime and security are paramount.

Mitigation Recommendations

Organizations should immediately review their deployment of EcoStruxure IT Data Center Expert version 8.3 and restrict network access to the management interface to trusted internal networks only, using network segmentation and firewall rules. Monitoring and logging of access to hidden URLs and unusual host header manipulations should be implemented to detect potential exploitation attempts. Until an official patch is released by Schneider Electric, applying virtual patching via Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) to block suspicious SSRF patterns is advisable. Additionally, organizations should conduct thorough security assessments and penetration testing focused on SSRF vectors in their environment. Implementing strict input validation and sanitization on all HTTP headers and parameters at the application layer can help mitigate SSRF risks. Finally, maintaining an incident response plan tailored to data center infrastructure compromises will improve readiness in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-12T13:53:23.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6870eef2a83201eaacae47d7

Added to database: 7/11/2025, 11:01:06 AM

Last enriched: 7/18/2025, 9:19:53 PM

Last updated: 8/22/2025, 9:09:11 PM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats