A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.
Advisories

No advisories yet.

Fixes

Solution

3.0.0 https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx


Workaround

No workaround given by the vendor.

History

Tue, 11 Nov 2025 14:00:00 +0000

Type Values Removed Values Added
Description A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.
Title Studio 5000 ® Simulation Interface Local Code Execution
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-11-11T13:49:49.524Z

Reserved: 2025-10-13T16:22:55.094Z

Link: CVE-2025-11697

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-11T14:15:34.787

Modified: 2025-11-11T14:15:34.787

Link: CVE-2025-11697

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.