Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59890: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Eaton Eaton Galileo Software

0
High
VulnerabilityCVE-2025-59890cvecve-2025-59890cwe-22
Published: Thu Nov 27 2025 (11/27/2025, 10:48:41 UTC)
Source: CVE Database V5
Vendor/Project: Eaton
Product: Eaton Galileo Software

Description

Improper input sanitization in the file archives upload functionality of Eaton Galileo software allows traversing paths which could lead into an attacker with local access to execute unauthorized code or commands. This security issue has been fixed in the latest version of Galileo which is available on the Eaton download center.

AI-Powered Analysis

AILast updated: 12/04/2025, 11:56:38 UTC

Technical Analysis

CVE-2025-59890 is a path traversal vulnerability classified under CWE-22 found in Eaton Galileo software, specifically in the file archives upload functionality. The flaw arises from improper input sanitization, which allows an attacker with local access and high privileges to craft file paths that traverse outside the intended restricted directories. This can lead to unauthorized code or command execution on the affected system. The vulnerability requires local access with elevated privileges (PR:H) but does not require user interaction (UI:N). The CVSS v3.1 base score is 7.3, reflecting high severity due to the potential for significant impact on confidentiality, integrity, and availability (C:L/I:L/A:H). The scope is changed (S:C), indicating that exploitation could affect resources beyond the initially vulnerable component. Eaton has fixed this vulnerability in the latest version of Galileo software, which is available on their download center. No public exploits have been reported yet, but the vulnerability poses a serious risk in environments where the software is deployed. The vulnerability is particularly concerning in industrial and critical infrastructure contexts where Eaton products are commonly used, as unauthorized code execution could disrupt operations or lead to further compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors such as manufacturing, energy, utilities, and critical infrastructure where Eaton Galileo software is deployed for power management and industrial control. Exploitation could lead to unauthorized code execution, potentially allowing attackers to manipulate system operations, disrupt services, or exfiltrate sensitive data. The requirement for local privileged access limits remote exploitation but does not eliminate risk, as insider threats or attackers who gain initial footholds could leverage this vulnerability to escalate privileges or move laterally. The impact on availability is high, as malicious code execution could disrupt critical industrial processes. Confidentiality and integrity impacts are also notable, as attackers could access or modify sensitive configuration or operational data. Given Europe's strong industrial base and reliance on such control systems, the vulnerability could have cascading effects on operational continuity and safety.

Mitigation Recommendations

European organizations should immediately update Eaton Galileo software to the latest patched version available from Eaton's official download center. Beyond patching, organizations should enforce strict access controls to limit local privileged access to trusted personnel only. Implementing robust endpoint protection and monitoring for anomalous file upload or command execution activities can help detect exploitation attempts. Network segmentation should isolate systems running Galileo software to reduce lateral movement opportunities. Regular audits of user privileges and file system permissions can prevent unauthorized access. Additionally, organizations should consider employing application whitelisting to restrict execution of unauthorized code. Incident response plans should be updated to include scenarios involving local privilege escalation and path traversal attacks. Finally, educating staff about the risks of local privilege misuse and maintaining up-to-date backups will aid in recovery if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Eaton
Date Reserved
2025-09-23T08:34:05.390Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692830538da2ca36c17c0982

Added to database: 11/27/2025, 11:04:51 AM

Last enriched: 12/4/2025, 11:56:38 AM

Last updated: 1/11/2026, 8:22:20 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats