A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.
References
| Link | Resource |
|---|---|
| https://github.com/Windscribe/Desktop-App | Product |
| https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-57e27ab201a1a612609087b839e03bf87a5a063ffcc3f465a6245469bc102754 | Patch |
| https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-cfc5df17057ed92112ae70a42c81c57c79f434429210ff881fb0771cf8e39b4c | Patch |
| https://hackingbydoing.wixsite.com/hackingbydoing/post/windscribe-vpn-local-privilege-escalation | Exploit Press/Media Coverage Third Party Advisory |
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-343-01.json | Third Party Advisory |
| https://www.cve.org/CVERecord?id=CVE-2025-65199 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
23 Dec 2025, 15:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:windscribe:windscribe:2.18.1:alpha:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.5:*:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:*:*:*:*:*:linux:*:* cpe:2.3:a:windscribe:windscribe:2.18.3:*:*:*:*:linux:*:* |
|
| First Time |
Windscribe
Windscribe windscribe |
|
| References | () https://github.com/Windscribe/Desktop-App - Product | |
| References | () https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-57e27ab201a1a612609087b839e03bf87a5a063ffcc3f465a6245469bc102754 - Patch | |
| References | () https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w#diff-cfc5df17057ed92112ae70a42c81c57c79f434429210ff881fb0771cf8e39b4c - Patch | |
| References | () https://hackingbydoing.wixsite.com/hackingbydoing/post/windscribe-vpn-local-privilege-escalation - Exploit, Press/Media Coverage, Third Party Advisory | |
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-343-01.json - Third Party Advisory | |
| References | () https://www.cve.org/CVERecord?id=CVE-2025-65199 - Third Party Advisory, US Government Resource |
10 Dec 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 19:16
Updated : 2025-12-23 15:27
NVD link : CVE-2025-65199
Mitre link : CVE-2025-65199
CVE.ORG link : CVE-2025-65199
JSON object : View
Products Affected
windscribe
- windscribe
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
