Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
References
| Link | Resource |
|---|---|
| https://github.com/sandboxie-plus/Sandboxie/commit/000492f8c411d24292f1b977a107994347bc7dfa | Patch |
| https://github.com/sandboxie-plus/Sandboxie/releases/tag/v1.16.7 | Release Notes |
| https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp | Exploit Vendor Advisory |
| https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp | Exploit Vendor Advisory |
Configurations
History
22 Dec 2025, 18:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:sandboxie-plus:sandboxie:*:*:*:*:plus:*:*:* | |
| First Time |
Sandboxie-plus
Sandboxie-plus sandboxie |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
| References | () https://github.com/sandboxie-plus/Sandboxie/commit/000492f8c411d24292f1b977a107994347bc7dfa - Patch | |
| References | () https://github.com/sandboxie-plus/Sandboxie/releases/tag/v1.16.7 - Release Notes | |
| References | () https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp - Exploit, Vendor Advisory |
15 Dec 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp - |
11 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 22:15
Updated : 2025-12-22 18:44
NVD link : CVE-2025-64721
Mitre link : CVE-2025-64721
CVE.ORG link : CVE-2025-64721
JSON object : View
Products Affected
sandboxie-plus
- sandboxie
CWE
CWE-190
Integer Overflow or Wraparound
