CVE-2025-13913

A privileged Ignition user, intentionally or otherwise, imports an external file with a specially crafted payload, which executes embedded malicious code.
Configurations

No configuration.

History

17 Mar 2026, 16:16

Type Values Removed Values Added
Summary (en) If an Ignition user imports an external file with a specially crafted payload, it could execute embedded malicious code during deserialization. (en) A privileged Ignition user, intentionally or otherwise, imports an external file with a specially crafted payload, which executes embedded malicious code.

16 Mar 2026, 21:16

Type Values Removed Values Added
Summary
  • (es) El Software Ignition de Inductive Automation es vulnerable a una exposición de endpoint de API no autenticado que puede permitir a un atacante cambiar remotamente la dirección de correo electrónico de recuperación de 'olvidé mi contraseña'.
Summary (en) Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure that may allow an attacker to remotely change the "forgot password" recovery email address. (en) If an Ignition user imports an external file with a specially crafted payload, it could execute embedded malicious code during deserialization.

12 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-12 19:16

Updated : 2026-03-17 16:16


NVD link : CVE-2025-13913

Mitre link : CVE-2025-13913

CVE.ORG link : CVE-2025-13913


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data