AutoCAD Plant 3D 2025.0.1 Update

Apr 18, 2024 – Autodesk released the AutoCAD Plant 3D 2025.0.1 Update

Jump Kit

The Framework for Civil 3D
Get More

Templates Only

See The Framework Work
Get More

Become a Member

Master Civil 3D
Get More

Autodesk Civil Videos

Free Civil 3D Training
Get More

Framework Videos

Free Civil 3D Videos
Get More

The AutoCAD Plant 3D 2025.0.1 Update is available via Autodesk Access or via download from the Autodesk subscription site.

The AutoCAD Plant 3D 2025.0.1 Update install requires access to the original install resources.

The AutoCAD Plant 3D 2025.0.1 Update cannot be uninstalled and includes all previous updates.

Official posted release date - Apr 18, 2024.

AutoCAD Plant 3D 2025.0.1 Update

Read the read me for the AutoCAD Plant 3D 2025.0.1 Update

Fixed Issues


  • Application crashes when you change the spec value for a P&ID line segment in the Properties palette.

General Content Update

Collaboration Workflow

  • It's possible now to check in files to over 50 folders in a single batch.

Mapping External Properties

  • Data in Excel files now displays correctly.


  • AutoCAD Architecture objects are now shown correctly in the views.
  • Fasteners are now shown in the views.
  • No orphan annotation enclosure is left in the view when switching viewports.


  • When selecting the "Auto Insert" option in the annotation settings, instrument annotations are now inserted without a duplication.
  • The PLANTANNOTATEDYNAMICINSTRUMENT system variable has been removed.
  • When copying an sLine, the line group properties in the tag are also now copied. Additionally, if the PLANTCOPYLINENUMBER system variable is turned on, the new sLine is added to the original line group.


  • The Slip-On flange is now accurately modeled in the piping model when using JIS/JPI content pack.


  • The field types in the file name format setting now work correctly.
  • The selection list with both numeric and alphabetic values is now sorted accurately.


  • The GTC component has been updated to address a security vulnerability.