CVE-2025-65199

A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:windscribe:windscribe:*:*:*:*:*:linux:*:*
cpe:2.3:a:windscribe:windscribe:2.18.1:alpha:*:*:*:linux:*:*
cpe:2.3:a:windscribe:windscribe:2.18.3:*:*:*:*:linux:*:*
cpe:2.3:a:windscribe:windscribe:2.18.5:*:*:*:*:linux:*:*

History

23 Dec 2025, 15:27

Type Values Removed Values Added
CPE cpe:2.3:a:windscribe:windscribe:2.18.1:alpha:*:*:*:linux:*:*
cpe:2.3:a:windscribe:windscribe:2.18.5:*:*:*:*:linux:*:*
cpe:2.3:a:windscribe:windscribe:*:*:*:*:*:linux:*:*
cpe:2.3:a:windscribe:windscribe:2.18.3:*:*:*:*:linux:*:*
First Time Windscribe
Windscribe windscribe
References () https://github.com/Windscribe/Desktop-App - () https://github.com/Windscribe/Desktop-App - Product
References () https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-57e27ab201a1a612609087b839e03bf87a5a063ffcc3f465a6245469bc102754 - () https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-57e27ab201a1a612609087b839e03bf87a5a063ffcc3f465a6245469bc102754 - Patch
References () https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-cfc5df17057ed92112ae70a42c81c57c79f434429210ff881fb0771cf8e39b4c - () https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-cfc5df17057ed92112ae70a42c81c57c79f434429210ff881fb0771cf8e39b4c - Patch
References () https://hackingbydoing.wixsite.com/hackingbydoing/post/windscribe-vpn-local-privilege-escalation - () https://hackingbydoing.wixsite.com/hackingbydoing/post/windscribe-vpn-local-privilege-escalation - Exploit, Press/Media Coverage, Third Party Advisory
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-343-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-343-01.json - Third Party Advisory
References () https://www.cve.org/CVERecord?id=CVE-2025-65199 - () https://www.cve.org/CVERecord?id=CVE-2025-65199 - Third Party Advisory, US Government Resource

10 Dec 2025, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-10 19:16

Updated : 2025-12-23 15:27


NVD link : CVE-2025-65199

Mitre link : CVE-2025-65199

CVE.ORG link : CVE-2025-65199


JSON object : View

Products Affected

windscribe

  • windscribe
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')