Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59890: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Eaton Eaton Galileo Software

0
High
VulnerabilityCVE-2025-59890cvecve-2025-59890cwe-22
Published: Thu Nov 27 2025 (11/27/2025, 10:48:41 UTC)
Source: CVE Database V5
Vendor/Project: Eaton
Product: Eaton Galileo Software

Description

Improper input sanitization in the file archives upload functionality of Eaton Galileo software allows traversing paths which could lead into an attacker with local access to execute unauthorized code or commands. This security issue has been fixed in the latest version of Galileo which is available on the Eaton download center.

AI-Powered Analysis

AILast updated: 11/27/2025, 11:14:34 UTC

Technical Analysis

CVE-2025-59890 is a path traversal vulnerability classified under CWE-22, found in Eaton Galileo software, specifically within the file archives upload functionality. The root cause is improper input sanitization that fails to restrict pathname inputs to a designated directory. This flaw enables an attacker possessing local access and high privileges to manipulate file paths, potentially accessing or overwriting files outside the intended directory scope. Such unauthorized access can lead to execution of arbitrary code or commands, compromising system confidentiality, integrity, and availability. The vulnerability's CVSS 3.1 score is 7.3, reflecting high severity due to its potential impact and ease of exploitation given local privileged access. The scope is considered changed (S:C) because exploitation can affect resources beyond the vulnerable component. No user interaction is required, but the attacker must have elevated privileges, limiting remote exploitation. Eaton has acknowledged and fixed the vulnerability in the latest Galileo software release, available through their official download center. No public exploits have been reported to date, but the vulnerability poses a significant risk if left unpatched, especially in environments where Galileo software is deployed for critical infrastructure or industrial control systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly those in sectors relying on Eaton Galileo software for industrial control, power management, or critical infrastructure. Successful exploitation can lead to unauthorized code execution, potentially disrupting operations, causing data breaches, or enabling further lateral movement within networks. The impact on availability is high, as attackers could execute commands that disrupt system functionality. Confidentiality and integrity are also at risk due to unauthorized file access or modification. Given the requirement for local privileged access, insider threats or compromised accounts pose the greatest risk. The vulnerability could facilitate sabotage, espionage, or operational downtime, which are critical concerns for European energy, manufacturing, and infrastructure sectors. Prompt patching is essential to prevent exploitation and maintain operational resilience.

Mitigation Recommendations

European organizations should immediately verify their use of Eaton Galileo software and identify affected versions. The primary mitigation is to upgrade to the latest patched version of Galileo available from Eaton's official download center. Until patching is complete, restrict local access to systems running the vulnerable software to trusted personnel only and enforce strict privilege management to minimize the risk of unauthorized access. Implement monitoring and logging of file upload activities and unusual command executions to detect potential exploitation attempts. Employ application whitelisting and endpoint protection solutions to prevent unauthorized code execution. Conduct regular audits of user privileges and access controls on affected systems. Additionally, network segmentation can limit the spread of an attacker who gains local access. Finally, ensure incident response plans include scenarios involving local privilege abuse and path traversal exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Eaton
Date Reserved
2025-09-23T08:34:05.390Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692830538da2ca36c17c0982

Added to database: 11/27/2025, 11:04:51 AM

Last enriched: 11/27/2025, 11:14:34 AM

Last updated: 11/27/2025, 1:07:03 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats