The vulnerability, if exploited, could allow an authenticated miscreant
(with privileges to create or access publication targets of type Text
File or HDFS) to upload and persist files that could potentially be
executed.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-25488 The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to create or access publication targets of type Text File or HDFS) to upload and persist files that could potentially be executed.
Fixes

Solution

AVEVA recommends organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected product versions should apply security updates to mitigate the risk of exploit. * Upgrade to PI Integrator for Business Analytics 2020 R2 SP2 or higher. * From [OSISoft Customer Portal](PI Integrator for Business Analytics), search for "PI Integrator for Business Analytics" and select version 2020 R2 SP2 or higher.


Workaround

Additionally, AVEVA recommends the following general defensive measures: * Audit assigned permissions to ensure that only trusted users are given access rights to publication targets: https://docs.aveva.com/bundle/pi-integrator-for-business-analytics/page/1013185.html * Ensure publication targets of type Text File or HDFS are configured to limit allowed output file extensions and limit output folders to be logically isolated from critical system components or executable paths: * https://docs.aveva.com/bundle/pi-integrator-for-business-analytics/page/1023019.html https://learn.microsoft.com/en-us/intune/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager

History

Fri, 22 Aug 2025 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Description The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to create or access publication targets of type Text File or HDFS) to upload and persist files that could potentially be executed.
Title AVEVA PI Integrator Unrestricted Upload of File with Dangerous Type
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-08-21T20:13:06.036Z

Reserved: 2025-07-31T16:41:30.389Z

Link: CVE-2025-54460

cve-icon Vulnrichment

Updated: 2025-08-21T20:13:00.514Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-21T20:15:45.883

Modified: 2025-08-22T18:08:51.663

Link: CVE-2025-54460

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.