
Cloud Vulnerability DB
A community-led vulnerabilities database
INVT VT-Designer PM3 File Parsing Type Confusion Remote Code Execution Vulnerability (CVE-2025-7230) was discovered and disclosed on July 7, 2025. This vulnerability affects INVT VT-Designer version 2.1.13 and allows remote attackers to execute arbitrary code on affected installations (Zero Day Initiative).
The vulnerability exists within the parsing of PM3 files and stems from the lack of proper validation of user-supplied data, which results in a type confusion condition (CWE-843). The vulnerability has been assigned a CVSS v3.0 base score of 7.8 (HIGH) with the vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (Zero Day Initiative).
An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. The vulnerability requires user interaction for exploitation, specifically requiring the target to visit a malicious page or open a malicious file (Zero Day Initiative).
Given the nature of the vulnerability, the only recommended mitigation strategy is to restrict interaction with the product. No official patch was available at the time of disclosure (Zero Day Initiative).
The vulnerability was initially reported to the vendor on March 5, 2025. After multiple attempts to contact the vendor through different channels, including ICS-CERT involvement from May to June 2025, the vulnerability was published as a zero-day advisory due to lack of vendor response (Zero Day Initiative).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."