Vulnerability Description
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aveva | Process Optimization | < 2025 |
Related Weaknesses (CWE)
References
- https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-01Third Party Advisory
- https://softwaresupportsp.aveva.com/en-US/downloads/products/details/a643eaa3-0dPermissions Required
- https://www.aveva.com/en/support-and-success/cyber-security-updates/Vendor Advisory
- https://www.cisa.gov/news-events/ics-advisories/icsa-26-015-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2025-64729?
CVE-2025-64729 is a vulnerability with a CVSS score of 8.1 (HIGH). The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identit...
How severe is CVE-2025-64729?
CVE-2025-64729 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-64729?
Check the references section above for vendor advisories and patch information. Affected products include: Aveva Process Optimization.