CVE-2025-61943
Published: 16 January 2026
Summary
CVE-2025-61943 is a high-severity SQL Injection (CWE-89) vulnerability in Aveva Process Optimization. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 1.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection exploitation by validating and sanitizing user inputs before incorporation into Captive Historian database queries.
Mitigates the vulnerability by identifying, reporting, and applying patches for the specific SQL injection flaw in Captive Historian as detailed in advisories.
Limits the impact of privilege escalation from Process Optimization Standard User to SQL Server admin by enforcing least privilege on accounts and processes.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection enables local authenticated user to escalate to SQL Server admin code execution (T1068).
NVD Description
The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Standard User) to tamper with queries in Captive Historian and achieve code execution under SQL Server administrative privileges, potentially resulting in complete compromise of the SQL Server.
Deeper analysisAI
CVE-2025-61943, published on 2026-01-16, is a SQL injection vulnerability (CWE-89) with a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N). It affects Captive Historian, where an authenticated Process Optimization Standard User can tamper with queries, leading to code execution under SQL Server administrative privileges and potential full compromise of the SQL Server instance.
The vulnerability requires local access, low attack complexity, and low privileges (PR:L) from an authenticated attacker, with no user interaction needed and a change in scope (S:C). Exploitation allows the attacker to achieve high confidentiality and integrity impacts through arbitrary code execution as a SQL Server administrator.
Advisories including CISA ICSA-26-015-01 and AVEVA support pages detail mitigations, with patches available for download from AVEVA's software support portal. Security practitioners should consult these references for specific remediation steps.
Details
- CWE(s)