A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.
References
| Link | Resource |
|---|---|
| https://github.com/Windscribe/Desktop-App | Product |
| https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-57e27ab201a1a612609087b839e03bf87a5a063ffcc3f465a6245469bc102754 | Patch |
| https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-cfc5df17057ed92112ae70a42c81c57c79f434429210ff881fb0771cf8e39b4c | Patch |
| https://hackingbydoing.wixsite.com/hackingbydoing/post/windscribe-vpn-local-privilege-escalation | Exploit Press/Media Coverage Third Party Advisory |
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-343-01.json | Third Party Advisory |
| https://www.cve.org/CVERecord?id=CVE-2025-65199 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-10 19:16
Updated : 2025-12-23 15:27
NVD link : CVE-2025-65199
Mitre link : CVE-2025-65199
CVE.ORG link : CVE-2025-65199
JSON object : View
Products Affected
windscribe
- windscribe
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
