Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade Ignition software from 8.1.x to 8.3.0 or greater.
Vendor Workaround
MITIGATION (8.1.x Linux). Implement Ignition Security Hardening Guide Appendix A. https://inductiveautomation.com/resources/article/ignition-security-hardening-guide
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 17 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If an Ignition user imports an external file with a specially crafted payload, it could execute embedded malicious code during deserialization. | A privileged Ignition user, intentionally or otherwise, imports an external file with a specially crafted payload, which executes embedded malicious code. |
Mon, 16 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure that may allow an attacker to remotely change the "forgot password" recovery email address. | If an Ignition user imports an external file with a specially crafted payload, it could execute embedded malicious code during deserialization. |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inductiveautomation
Inductiveautomation ignition |
|
| Vendors & Products |
Inductiveautomation
Inductiveautomation ignition |
Thu, 12 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure that may allow an attacker to remotely change the "forgot password" recovery email address. | |
| Title | Inductive Automation Ignition Software Deserialization of Untrusted Data | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-03-17T15:29:47.962Z
Reserved: 2025-12-02T17:43:55.964Z
Link: CVE-2025-13913
Updated: 2026-03-12T19:06:39.250Z
Status : Awaiting Analysis
Published: 2026-03-12T19:16:14.250
Modified: 2026-03-17T16:16:17.210
Link: CVE-2025-13913
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:48:35Z