Description
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
Problem types
Product status
Any version
Credits
Christopher Wu of Veracode reported these vulnerabilities to AVEVA.
References
www.aveva.com/en/support-and-success/cyber-security-updates/
softwaresupportsp.aveva.com/...3-0d85-4fde-ac11-5239e87a68ea
www.cisa.gov/news-events/ics-advisories/icsa-26-015-01
github.com/...p/csaf_files/OT/white/2026/icsa-26-015-01.json