PT-2025-50150 · Microsoft · Windows Powershell+1
Mortem
·
Published
2025-12-09
·
Updated
2026-03-10
·
CVE-2025-54100
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows PowerShell versions prior to December 17, 2025
Description
The issue is a command injection flaw in Windows PowerShell that allows an unauthorized attacker to execute code locally. The flaw stems from improper neutralization of special elements during command execution. The vulnerability primarily impacts enterprise or IT-managed environments that utilize PowerShell scripts for automation. The vulnerability allows remote attackers to execute arbitrary code and affect the system. Microsoft PowerShell 5.1 now issues a security confirmation prompt when running the
Invoke-WebRequest command to mitigate the risk.API Endpoints:
/api/v1/login (example, not explicitly mentioned in the input)Vulnerable Parameters or Variables:
username, password (examples, not explicitly mentioned in the input)Function Names:
Invoke-WebRequestRecommendations
Versions prior to December 17, 2025: Install the latest security updates released by Microsoft.
Versions prior to December 17, 2025: Consider temporarily disabling or restricting the use of the
Invoke-WebRequest function until a patch is applied.Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Windows
Windows Powershell