A privileged Ignition user, intentionally or otherwise, imports an external file with a specially crafted payload, which executes embedded malicious code.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If an Ignition user imports an external file with a specially crafted payload, it could execute embedded malicious code during deserialization. | A privileged Ignition user, intentionally or otherwise, imports an external file with a specially crafted payload, which executes embedded malicious code. |
Mon, 16 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure that may allow an attacker to remotely change the "forgot password" recovery email address. | If an Ignition user imports an external file with a specially crafted payload, it could execute embedded malicious code during deserialization. |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inductiveautomation
Inductiveautomation ignition |
|
| Vendors & Products |
Inductiveautomation
Inductiveautomation ignition |
Thu, 12 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure that may allow an attacker to remotely change the "forgot password" recovery email address. | |
| Title | Inductive Automation Ignition Software Deserialization of Untrusted Data | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2026-03-12T18:17:22.839Z
Updated: 2026-03-17T15:29:47.962Z
Reserved: 2025-12-02T17:43:55.964Z
Link: CVE-2025-13913
Updated: 2026-03-12T19:06:39.250Z
Status : Awaiting Analysis
Published: 2026-03-12T19:16:14.250
Modified: 2026-03-17T16:16:17.210
Link: CVE-2025-13913
No data.