CVE-2022-50917

ProtonVPN 1.26.0 contains an unquoted service path vulnerability in its WireGuard service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path by placing malicious executables in specific file system locations to gain elevated privileges during service startup.
Configurations

Configuration 1 (hide)

cpe:2.3:a:proton:protonvpn:1.26.0:*:*:*:*:windows:*:*

History

27 Feb 2026, 19:49

Type Values Removed Values Added
CPE cpe:2.3:a:proton:protonvpn:1.26.0:*:*:*:*:windows:*:*
References () https://protonvpn.com/ - () https://protonvpn.com/ - Broken Link
References () https://www.exploit-db.com/exploits/50837 - () https://www.exploit-db.com/exploits/50837 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/protonvpn-unquoted-service-path - () https://www.vulncheck.com/advisories/protonvpn-unquoted-service-path - Third Party Advisory
First Time Proton
Proton protonvpn

13 Jan 2026, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-13 23:15

Updated : 2026-02-27 19:49


NVD link : CVE-2022-50917

Mitre link : CVE-2022-50917

CVE.ORG link : CVE-2022-50917


JSON object : View

Products Affected

proton

  • protonvpn
CWE
CWE-428

Unquoted Search Path or Element