PT-2025-50150 · Microsoft · Windows Powershell +1
Mortem
·
Published
2025-12-09
·
Updated
2026-01-24
·
CVE-2025-54100
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows PowerShell versions prior to December 17, 2025
Description
The issue is a command injection flaw in Windows PowerShell that allows an unauthorized attacker to execute code locally. The flaw stems from improper neutralization of special elements during command execution. The vulnerability primarily impacts enterprise or IT-managed environments that utilize PowerShell scripts for automation. The vulnerability allows remote attackers to execute arbitrary code and affect the system. Microsoft PowerShell 5.1 now issues a security confirmation prompt when running the
Invoke-WebRequest command to mitigate the risk.API Endpoints:
/api/v1/login (example, not explicitly mentioned in the input)Vulnerable Parameters or Variables:
username, password (examples, not explicitly mentioned in the input)Function Names:
Invoke-WebRequestRecommendations
Versions prior to December 17, 2025: Install the latest security updates released by Microsoft.
Versions prior to December 17, 2025: Consider temporarily disabling or restricting the use of the
Invoke-WebRequest function until a patch is applied.Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-15632
CVE-2025-54100
Affected Products
Windows
Windows Powershell
References · 43
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54100 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54100 · Security Note
- https://bdu.fstec.ru/vul/2025-15632 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54100 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/727066 · Security Note
- https://vicarius.io/vsociety/posts/cve-2025-54100-mitigate-powershell-vulnerability · Note
- https://twitter.com/dailytechonx/status/1999176109397573871 · Twitter Post
- https://vicarius.io/vsociety/posts/cve-2025-54100-detect-powershell-vulnerability · Note
- https://twitter.com/UndercodeUpdate/status/1999699633581535366 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1pk8w7y/cve202562221_and_cve202554100_windows_elevation · Reddit Post
- https://twitter.com/TweetThreatNews/status/1998595569564975423 · Twitter Post
- https://thehackernews.com/2025/12/microsoft-issues-security-fixes-for-56.html · Note
- https://reddit.com/r/CVEWatch/comments/1pjuul2/top_10_trending_cves_11122025 · Reddit Post
- https://t.me/true_secator/7711 · Telegram Post