Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:schneider-electric:powerchute_serial_shutdown:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 15 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal Allows Critical File Overwrite in PowerChute Serial Shutdown |
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Schneider-electric
Schneider-electric powerchute Serial Shutdown |
|
| Vendors & Products |
Schneider-electric
Schneider-electric powerchute Serial Shutdown |
Tue, 14 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause critical files overwritten with text data when a Web Admin user alters the POST /REST/upssleep request payload. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: schneider
Published:
Updated: 2026-04-14T15:52:07.599Z
Reserved: 2026-02-12T13:16:54.228Z
Link: CVE-2026-2399
Updated: 2026-04-14T15:52:01.686Z
Status : Analyzed
Published: 2026-04-14T16:16:38.290
Modified: 2026-04-22T14:11:32.343
Link: CVE-2026-2399
No data.
OpenCVE Enrichment
Updated: 2026-04-15T15:30:06Z