Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8386: CWE-80 in AVEVA Application Server

0
Medium
VulnerabilityCVE-2025-8386cvecve-2025-8386cwe-80
Published: Fri Nov 14 2025 (11/14/2025, 23:57:04 UTC)
Source: CVE Database V5
Vendor/Project: AVEVA
Product: Application Server

Description

The vulnerability, if exploited, could allow an authenticated miscreant (with privilege of "aaConfigTools") to tamper with App Objects' help files and persist a cross-site scripting (XSS) injection that when executed by a victim user, can result in horizontal or vertical escalation of privileges. The vulnerability can only be exploited during config-time operations within the IDE component of Application Server. Run-time components and operations are not affected.

AI-Powered Analysis

AILast updated: 11/15/2025, 00:21:35 UTC

Technical Analysis

CVE-2025-8386 is a cross-site scripting (XSS) vulnerability classified under CWE-80, found in the AVEVA Application Server product. The flaw exists in the IDE component used for configuration-time operations, specifically allowing an authenticated user with the 'aaConfigTools' privilege to tamper with application objects' help files. By injecting malicious scripts into these help files, the attacker can create persistent XSS payloads that execute when other users access the help content. This execution can result in horizontal privilege escalation (accessing peers' privileges) or vertical privilege escalation (gaining higher privileges). The vulnerability does not impact run-time components or operations, limiting the attack surface to configuration phases. Exploitation requires the attacker to have high-level privileges and user interaction to trigger the payload, which reduces the risk of widespread automated exploitation. The CVSS v3.1 score of 6.9 reflects a medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and high confidentiality impact (C:H), low integrity (I:L), and low availability (A:L) impacts. No public exploits are currently known, and no patches have been linked yet, emphasizing the need for vigilance and proactive mitigation.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors that rely on AVEVA Application Server, this vulnerability poses a risk of unauthorized privilege escalation and potential compromise of sensitive configuration data. The ability to persistently inject XSS payloads into help files could allow attackers to execute malicious scripts in the context of other users, potentially leading to unauthorized access to configuration settings or manipulation of application behavior. Although exploitation requires authenticated access with specific privileges and user interaction, insider threats or compromised accounts could leverage this vulnerability to escalate privileges or move laterally within the environment. This could disrupt operational technology (OT) environments, cause data breaches, or degrade system integrity. The limited impact on run-time components reduces the risk to live operations but does not eliminate the threat to configuration integrity and confidentiality.

Mitigation Recommendations

Organizations should immediately review and restrict access to the 'aaConfigTools' privilege, ensuring only trusted and necessary personnel have configuration rights. Implement strict access controls and multi-factor authentication (MFA) for users accessing the IDE component of AVEVA Application Server. Monitor and audit configuration-time operations and help file modifications for suspicious activity. Since no patches are currently available, consider isolating configuration interfaces from general network access and applying network segmentation to limit exposure. Educate users about the risks of executing untrusted scripts and enforce secure coding and input validation practices within the configuration environment. Once a patch or update is released by AVEVA, prioritize its deployment. Additionally, implement Content Security Policy (CSP) headers if possible to mitigate the impact of XSS payloads.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-07-30T18:49:26.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6917c40aed594783724e114b

Added to database: 11/15/2025, 12:06:34 AM

Last enriched: 11/15/2025, 12:21:35 AM

Last updated: 11/15/2025, 7:17:09 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats