{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4681","assignerOrgId":"0b655efc-079c-4cb9-9e8d-164871239f4e","state":"PUBLISHED","assignerShortName":"PTC","dateReserved":"2026-03-23T21:42:24.158Z","datePublished":"2026-03-23T21:48:05.652Z","dateUpdated":"2026-03-24T14:49:43.425Z"},"containers":{"cna":{"providerMetadata":{"orgId":"0b655efc-079c-4cb9-9e8d-164871239f4e","shortName":"PTC","dateUpdated":"2026-03-23T21:48:05.652Z"},"title":"Critical Remote Code Execution vulnerability reported in Windchill","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-94","description":"CWE-94: Improper Control of Generation of Code ('Code Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-242","descriptions":[{"lang":"en","value":"CAPEC-242 Code Injection"}]}],"affected":[{"vendor":"PTC","product":"Windchill PDMLink","versions":[{"status":"affected","version":"11.0 M030","versionType":"semver"},{"status":"affected","version":"11.1 M020","versionType":"semver"},{"status":"affected","version":"11.2.1.0","versionType":"semver"},{"status":"affected","version":"12.0.2.0","versionType":"semver"},{"status":"affected","version":"12.1.2.0","versionType":"semver"},{"status":"affected","version":"13.0.2.0","versionType":"semver"},{"status":"affected","version":"13.1.0.0"},{"status":"affected","version":"13.1.1.0"},{"status":"affected","version":"13.1.2.0"},{"status":"affected","version":"13.1.3.0"}],"defaultStatus":"unknown"},{"vendor":"PTC","product":"FlexPLM","versions":[{"status":"affected","version":"11.0 M030"},{"status":"affected","version":"11.1 M020"},{"status":"affected","version":"11.2.1.0"},{"status":"affected","version":"12.0.0.0"},{"status":"affected","version":"12.0.2.0"},{"status":"affected","version":"12.0.3.0"},{"status":"affected","version":"12.1.2.0"},{"status":"affected","version":"12.1.3.0"},{"status":"affected","version":"13.0.2.0"},{"status":"affected","version":"13.0.3.0"}],"defaultStatus":"unknown"}],"descriptions":[{"lang":"en","value":"A critical remote code execution (RCE) vulnerability has been reported in PTC Windchill and PTC FlexPLM. The vulnerability may be exploited through the deserialization of untrusted data.\n\nThis issue affects Windchill PDMLink: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.2.0, 12.1.2.0, 13.0.2.0, 13.1.0.0, 13.1.1.0, 13.1.2.0, 13.1.3.0; FlexPLM: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.0.0, 12.0.2.0, 12.0.3.0, 12.1.2.0, 12.1.3.0, 13.0.2.0, 13.0.3.0.","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><span>A critical remote code execution (RCE) vulnerability has been reported in PTC Windchill and PTC FlexPLM. The vulnerability may be exploited through the deserialization of untrusted data.</span></div><div><p>This issue affects Windchill PDMLink: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.2.0, 12.1.2.0, 13.0.2.0, 13.1.0.0, 13.1.1.0, 13.1.2.0, 13.1.3.0; FlexPLM: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.0.0, 12.0.2.0, 12.0.3.0, 12.1.2.0, 12.1.3.0, 13.0.2.0, 13.0.3.0.</p></div>"}]}],"references":[{"url":"https://www.ptc.com/en/about/trust-center/advisory-center/active-advisories/windchill-flexplm-critical-vulnerability?srsltid=AfmBOop3e7Nthx5-BsrjKdpZi50wL6l6Bt21Fz0gUub2cIPgdPGV5bNl","tags":["vendor-advisory","mitigation"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"LOW","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","version":"4.0","baseSeverity":"CRITICAL","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/AU:Y/R:U/V:C/RE:M/U:Red"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T14:48:53.854433Z","id":"CVE-2026-4681","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T14:49:43.425Z"}}]}}