Skip to main content

CVE-2025-54925: CWE-918 Server-Side Request Forgery (SSRF) in Schneider Electric EcoStruxure™ Power Monitoring Expert (PME)

High
VulnerabilityCVE-2025-54925cvecve-2025-54925cwe-918
Published: Wed Aug 20 2025 (08/20/2025, 13:44:21 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EcoStruxure™ Power Monitoring Expert (PME)

Description

CWE-918: Server-Side Request Forgery (SSRF) vulnerability exists that could cause unauthorized access to sensitive data when an attacker configures the application to access a malicious url.

AI-Powered Analysis

AILast updated: 08/20/2025, 14:18:10 UTC

Technical Analysis

CVE-2025-54925 is a Server-Side Request Forgery (SSRF) vulnerability identified in Schneider Electric's EcoStruxure™ Power Monitoring Expert (PME) product, affecting versions 2022, 2023, 2024, and 2024 R2. SSRF vulnerabilities occur when an attacker can manipulate a vulnerable server to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network access controls. In this case, the vulnerability allows an attacker to configure the PME application to access a malicious URL, which can lead to unauthorized access to sensitive data. The vulnerability is classified under CWE-918, indicating that the server does not properly validate or sanitize user-supplied URLs before making requests. The CVSS v3.1 score of 7.5 (high severity) reflects that the vulnerability can be exploited remotely over the network without authentication or user interaction, with a high impact on confidentiality but no impact on integrity or availability. Although no known exploits are currently reported in the wild, the potential for data exposure is significant given the nature of PME as a critical industrial monitoring system. The vulnerability could allow attackers to access internal resources or sensitive configuration data that should not be externally accessible, potentially leading to further compromise or information leakage within industrial control environments.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities that rely on Schneider Electric's EcoStruxure™ PME for power monitoring and management, this vulnerability poses a serious risk. Unauthorized access to sensitive operational data could lead to exposure of network topology, system configurations, or operational metrics, which could be leveraged for further attacks or industrial espionage. Given the role of PME in monitoring power systems, attackers could gain insights into energy consumption patterns or system statuses, potentially disrupting operational confidentiality. While the vulnerability does not directly impact system integrity or availability, the confidentiality breach alone can have regulatory and operational consequences, including violations of GDPR if personal or sensitive data is involved. The lack of required authentication and user interaction increases the risk of automated exploitation attempts, which could be particularly concerning in environments with internet-facing PME instances or insufficient network segmentation.

Mitigation Recommendations

To mitigate this SSRF vulnerability, European organizations should immediately assess their deployment of Schneider Electric EcoStruxure™ PME and identify affected versions. Since no patch links are currently provided, organizations should engage directly with Schneider Electric support to obtain official patches or workarounds. In the interim, network-level controls should be enforced to restrict outbound HTTP requests from PME servers to only trusted domains and IP addresses, effectively limiting the ability to reach malicious URLs. Implement strict input validation and URL filtering on the PME application if customization is possible. Additionally, network segmentation should isolate PME systems from the internet and sensitive internal networks to reduce exposure. Monitoring and logging of outbound requests from PME servers should be enhanced to detect anomalous or unauthorized access attempts. Organizations should also review access controls and ensure that PME management interfaces are not publicly accessible. Finally, incorporate this vulnerability into incident response plans and conduct security awareness training for operational technology (OT) teams to recognize potential exploitation signs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-08-01T04:38:47.036Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a5d58ead5a09ad00052200

Added to database: 8/20/2025, 2:02:54 PM

Last enriched: 8/20/2025, 2:18:10 PM

Last updated: 8/21/2025, 12:35:14 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats