Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_GetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to write to. GetRegValue then writes the contents of the SBIE registry entry selected to this address. An attacker can pass in a kernel pointer and the driver dumps the registry key contents we requested to it. This can be triggered by anyone on the system, including low integrity windows processes. Version 1.15.12 fixes the issue.
References
Link | Resource |
---|---|
https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-67p9-6h73-ff7x | Exploit Vendor Advisory |
Configurations
History
04 Aug 2025, 17:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-67p9-6h73-ff7x - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:sandboxie-plus:sandboxie:*:*:*:*:plus:*:*:* | |
First Time |
Sandboxie-plus sandboxie
Sandboxie-plus |
23 May 2025, 15:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-22 17:15
Updated : 2025-08-04 17:25
NVD link : CVE-2025-46715
Mitre link : CVE-2025-46715
CVE.ORG link : CVE-2025-46715
JSON object : View
Products Affected
sandboxie-plus
- sandboxie
CWE
CWE-787
Out-of-bounds Write