Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7719: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GE Vernova Smallworld

0
Medium
VulnerabilityCVE-2025-7719cvecve-2025-7719cwe-22
Published: Fri Nov 07 2025 (11/07/2025, 16:28:03 UTC)
Source: CVE Database V5
Vendor/Project: GE Vernova
Product: Smallworld

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE Vernova Smallworld on Windows, Linux allows File Manipulation.This issue affects Smallworld: 5.3.5. and previous versions.

AI-Powered Analysis

AILast updated: 11/14/2025, 17:40:16 UTC

Technical Analysis

CVE-2025-7719 is a path traversal vulnerability classified under CWE-22, found in GE Vernova Smallworld software versions 5.3.5 and earlier. Smallworld is a geospatial information system widely used in utilities, telecommunications, and infrastructure management. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to craft file paths that escape the intended restricted directories. This can lead to unauthorized file manipulation, including reading, writing, or deleting files outside the application’s designated directories. The vulnerability affects both Windows and Linux deployments of Smallworld. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low complexity (AC:L), requires no user interaction (UI:N), but does require low privileges (PR:L). The impact on confidentiality, integrity, and availability is low individually but combined can be significant, especially in critical infrastructure environments. No patches are currently linked, and no exploits are known in the wild, but the vulnerability is publicly disclosed and should be addressed promptly to prevent potential exploitation. The lack of user interaction and remote attack vector increase the risk profile. The vulnerability’s exploitation could allow attackers to access sensitive configuration files, manipulate operational data, or disrupt service continuity by altering critical files.

Potential Impact

For European organizations, especially those in utilities, telecommunications, and infrastructure sectors relying on GE Vernova Smallworld, this vulnerability poses a risk of unauthorized file access and manipulation. This could lead to data breaches involving sensitive geospatial and operational data, potentially disrupting service delivery and damaging organizational reputation. The integrity of critical infrastructure data could be compromised, affecting decision-making and operational safety. The availability of services may also be impacted if attackers delete or corrupt essential files. Given the strategic importance of infrastructure in Europe and regulatory requirements around data protection and operational resilience, exploitation could result in regulatory penalties and increased scrutiny. Organizations with extensive Smallworld deployments in countries with advanced infrastructure networks are particularly vulnerable. The medium severity rating reflects a moderate but tangible risk that requires timely mitigation to avoid escalation.

Mitigation Recommendations

1. Monitor GE Vernova’s official channels for patches addressing CVE-2025-7719 and apply them immediately upon release. 2. Until patches are available, restrict user privileges to the minimum necessary, especially limiting write and execute permissions on directories accessible by Smallworld. 3. Implement strict input validation and sanitization on all pathname inputs within the application environment to prevent traversal sequences. 4. Employ file integrity monitoring tools to detect unauthorized changes to critical files and directories used by Smallworld. 5. Use application whitelisting and endpoint protection to limit execution of unauthorized code or scripts that could exploit this vulnerability. 6. Conduct regular security audits and penetration testing focused on file system access controls within Smallworld deployments. 7. Network segmentation should isolate Smallworld servers from less trusted network zones to reduce attack surface. 8. Educate system administrators and users about the risks of path traversal vulnerabilities and encourage reporting of suspicious activity. 9. Maintain comprehensive logging and alerting on file access events to enable rapid detection and response to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GE_Vernova
Date Reserved
2025-07-16T16:37:57.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690e23aa5ed2b3c9882b3448

Added to database: 11/7/2025, 4:51:54 PM

Last enriched: 11/14/2025, 5:40:16 PM

Last updated: 12/23/2025, 3:25:10 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats