Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7719: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GE Vernova Smallworld

0
Medium
VulnerabilityCVE-2025-7719cvecve-2025-7719cwe-22
Published: Fri Nov 07 2025 (11/07/2025, 16:28:03 UTC)
Source: CVE Database V5
Vendor/Project: GE Vernova
Product: Smallworld

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE Vernova Smallworld on Windows, Linux allows File Manipulation.This issue affects Smallworld: 5.3.5. and previous versions.

AI-Powered Analysis

AILast updated: 11/07/2025, 17:00:31 UTC

Technical Analysis

CVE-2025-7719 identifies a path traversal vulnerability (CWE-22) in GE Vernova Smallworld, a geospatial software product widely used in utilities and infrastructure management. The vulnerability affects version 5.3.5 and earlier on both Windows and Linux platforms. It stems from improper validation and limitation of pathname inputs, allowing an attacker with limited privileges to craft file paths that escape the intended restricted directories. This can lead to unauthorized file manipulation, including reading, writing, or deleting files outside the application's designated directories. The vulnerability does not require user interaction and can be exploited remotely over the network without authentication, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact vector includes low confidentiality, integrity, and availability impacts, reflecting the potential for limited but meaningful unauthorized file access or modification. No patches are currently linked, and no known exploits have been reported in the wild, indicating the vulnerability is newly disclosed. The flaw could be leveraged to escalate privileges, tamper with configuration files, or disrupt operations by manipulating critical data files. Given Smallworld's role in managing geospatial data for utilities and infrastructure, such unauthorized access could compromise operational integrity or expose sensitive information. The vulnerability's medium severity score (5.3) reflects moderate risk, balancing ease of exploitation with limited impact scope. Organizations running affected Smallworld versions should prioritize remediation to prevent exploitation.

Potential Impact

For European organizations, especially those in utilities, energy, and infrastructure sectors that rely on GE Vernova Smallworld for geospatial data management, this vulnerability poses a risk of unauthorized file manipulation. Exploitation could lead to exposure or alteration of sensitive geospatial data, impacting operational decision-making and potentially causing service disruptions. Confidentiality breaches could expose critical infrastructure layouts or customer data, while integrity compromises might result in corrupted or falsified geospatial information, undermining trust and safety. Availability impacts, though limited, could disrupt workflows dependent on accurate data. The vulnerability's exploitation without user interaction and over the network increases risk, particularly in environments with insufficient privilege separation or weak file system permissions. European organizations with complex infrastructure and regulatory compliance requirements may face reputational damage and regulatory penalties if exploited. The absence of known exploits currently provides a window for proactive mitigation, but the potential impact on critical infrastructure elevates the threat's importance.

Mitigation Recommendations

1. Apply official patches or updates from GE Vernova as soon as they become available to address CVE-2025-7719. 2. Until patches are released, enforce strict file system permissions to limit Smallworld's access to only necessary directories, minimizing the risk of path traversal exploitation. 3. Implement network segmentation and firewall rules to restrict access to Smallworld services to trusted internal users and systems. 4. Monitor file system activity for unusual access patterns or unauthorized file modifications, using host-based intrusion detection systems tailored to detect path traversal attempts. 5. Conduct regular security audits and code reviews focusing on input validation and pathname handling within Smallworld customizations or integrations. 6. Educate system administrators and users about the risks of path traversal vulnerabilities and encourage prompt reporting of suspicious behavior. 7. Consider deploying application-layer security controls such as web application firewalls (WAFs) that can detect and block path traversal payloads if Smallworld is accessed via web interfaces. 8. Maintain up-to-date backups of critical geospatial data to enable recovery in case of data corruption or deletion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GE_Vernova
Date Reserved
2025-07-16T16:37:57.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690e23aa5ed2b3c9882b3448

Added to database: 11/7/2025, 4:51:54 PM

Last enriched: 11/7/2025, 5:00:31 PM

Last updated: 11/8/2025, 9:25:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats