ProtonVPN 1.26.0 contains an unquoted service path vulnerability in its WireGuard service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path by placing malicious executables in specific file system locations to gain elevated privileges during service startup.
References
| Link | Resource |
|---|---|
| https://protonvpn.com/ | Broken Link |
| https://www.exploit-db.com/exploits/50837 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/protonvpn-unquoted-service-path | Third Party Advisory |
Configurations
History
27 Feb 2026, 19:49
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:proton:protonvpn:1.26.0:*:*:*:*:windows:*:* | |
| References | () https://protonvpn.com/ - Broken Link | |
| References | () https://www.exploit-db.com/exploits/50837 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/protonvpn-unquoted-service-path - Third Party Advisory | |
| First Time |
Proton
Proton protonvpn |
13 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:15
Updated : 2026-02-27 19:49
NVD link : CVE-2022-50917
Mitre link : CVE-2022-50917
CVE.ORG link : CVE-2022-50917
JSON object : View
Products Affected
proton
- protonvpn
CWE
CWE-428
Unquoted Search Path or Element
