MSRC compact vulnerability detail

CVE-2025-25004 · PowerShell Elevation of Privilege Vulnerability

Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.

Severity
Important
Impact
Elevation of Privilege
CVSS
7.3 base · 6.4 temporal
Release
2025-10-14
Signals
Microsoft PowerShell Elevation of Privilege Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.
FAQ / Articles
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the "NT AUTHORITY\SYSTEM" account.
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authenticated attacker could place a malicious file in a specified custom module path and then wait for a user to run a privileged .NET application that starts a PowerShell session under NT AUTHORITY\SYSTEM privileges
Microsoft PowerShell Elevation of Privilege Vulnerability
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.