Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-54100

Опубликовано: 09 дек. 2025
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

PowerShell Remote Code Execution Vulnerability

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

FAQ

Is there more information I need to know after I install the Security Updates to address this vulnerability?

After you install the updates, when you use the Invoke-WebRequest command you will see the following confirmation prompt with security warning of script execution risk:

Security Warning: Script Execution Risk Invoke-WebRequest parses the content of the web page. Script code in the web page might be run when the page is parsed. RECOMMENDED ACTION: Use the -UseBasicParsing switch to avoid script code execution. Do you want to continue?

For additional details, see KB5074596: PowerShell 5.1: Preventing script execution from web content.

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.

After I install security update 5074204 or 5074353 will a reboot be required?

Yes. After you install Security Update 5074204 or 5074353, you will be required to reboot your system.

Note that your PowerShell session itself does not require a reboot unless a particular utility DLL is loaded in memory during the session. Consistent with previous updates, only the presence of certain DLLs in use might trigger a reboot prompt.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

Yes

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 27%
0.00095
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
8 дней назад

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

CVSS3: 7.8
github
8 дней назад

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

CVSS3: 7.8
fstec
9 дней назад

Уязвимость интерпретатора команд PowerShell операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 27%
0.00095
Низкий

7.8 High

CVSS3