When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
History

Wed, 19 Nov 2025 03:30:00 +0000

Type Values Removed Values Added
Description When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
Title Windows service used an uncontrolled search path element will cause unauthorized code execution with localsystem privileges
Weaknesses CWE-427
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ASUSTOR1

Published: 2025-11-19T02:50:57.285Z

Updated: 2025-11-19T03:15:31.719Z

Reserved: 2025-11-12T10:01:29.924Z

Link: CVE-2025-13051

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-19T04:16:05.317

Modified: 2025-11-19T04:16:05.317

Link: CVE-2025-13051

cve-icon Redhat

No data.