CVE-2025-30399
📊 7.5 HIGH⚡ 0.1%🎯 0 exploits
📅 Published Jun 13, 2025
📋 Status: Analyzed
Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network.
CVSS v3.1 • [email protected]
🎯 Affected Products & Systems
14 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
📱App | microsoft | visual studio 2022 | ≥ 17.8.0 ∧ < 17.8.22 | Vulnerable | cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* |
📱App | microsoft | visual studio 2022 | ≥ 17.10.0 ∧ < 17.10.16 | Vulnerable | cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* |
📱App | microsoft | visual studio 2022 | ≥ 17.12.0 ∧ < 17.12.9 | Vulnerable | cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* |
📱App | microsoft | visual studio 2022 | ≥ 17.14.0 ∧ < 17.14.5 | Vulnerable | cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* |
📱App | microsoft | .net | ≥ 9.0.0 ∧ < 9.0.6 | Vulnerable | cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* |
💻OS | apple | macos | All versions | Not Vulnerable | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
💻OS | linux | linux kernel | All versions | Not Vulnerable | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
💻OS | microsoft | windows | All versions | Not Vulnerable | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
📱App | microsoft | .net | ≥ 8.0.0 ∧ < 8.0.17 | Vulnerable | cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* |
💻OS | apple | macos | All versions | Not Vulnerable | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
💻OS | linux | linux kernel | All versions | Not Vulnerable | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
💻OS | microsoft | windows | All versions | Not Vulnerable | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
📱App | microsoft | powershell | ≥ 7.4 ∧ < 7.4.11 | Vulnerable | cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* |
📱App | microsoft | powershell | ≥ 7.5 ∧ < 7.5.2 | Vulnerable | cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* |
📱
VulnerableApplication
Version: ≥ 17.8.0 ∧ < 17.8.22
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: ≥ 17.10.0 ∧ < 17.10.16
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: ≥ 17.12.0 ∧ < 17.12.9
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: ≥ 17.14.0 ∧ < 17.14.5
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
Version: ≥ 9.0.0 ∧ < 9.0.6
CPE:
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
💻
SafeOperating System
Version: All versions
CPE:
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Version: ≥ 8.0.0 ∧ < 8.0.17
CPE:
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
💻
SafeOperating System
Version: All versions
CPE:
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: ≥ 7.4 ∧ < 7.4.11
CPE:
cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: ≥ 7.5 ∧ < 7.5.2
CPE:
cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
14 products•scroll for more
Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
HIGH
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
7.5 (HIGH)v3.1
Source: [email protected]
EPSS Details
0.1% (Minimal)18.4th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
Jun 13, 2025 (4 months ago)
Last Modified
Jul 10, 2025 (3 months ago)
Security Weaknesses1
CWE-426
References2
NVDadvisory