An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a CODESYS development system. This arbitrary code is executed in the user context.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 01 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Codesys
Codesys development System
Vendors & Products Codesys
Codesys development System

Mon, 01 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
Description An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a CODESYS development system. This arbitrary code is executed in the user context.
Title CODESYS Development System - Deserialization of Untrusted Data
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-12-01T13:59:26.310Z

Reserved: 2025-04-16T11:17:48.310Z

Link: CVE-2025-41700

cve-icon Vulnrichment

Updated: 2025-12-01T13:59:21.545Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-01T10:16:00.440

Modified: 2025-12-01T15:39:33.110

Link: CVE-2025-41700

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-01T15:17:53Z