Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25545: n/a

0
High
VulnerabilityCVE-2024-25545cvecve-2024-25545
Published: Fri Apr 12 2024 (04/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Weave Weave Desktop v.7.78.10 allows a local attacker to execute arbitrary code via a crafted script to the nwjs framework component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:49:47 UTC

Technical Analysis

CVE-2024-25545 is a vulnerability identified in Weave Weave Desktop version 7.78.10, specifically affecting the nwjs framework component embedded within the application. The vulnerability allows a local attacker with limited privileges (PR:L) to execute arbitrary code by supplying a specially crafted script. The nwjs framework, which combines Node.js and Chromium, is used to build desktop applications with web technologies, and improper handling of script inputs can lead to code execution flaws. This vulnerability is classified under CWE-358 (Improperly Implemented Security Check for Standard), indicating a failure in enforcing proper security checks before executing code. The CVSS v3.1 base score is 7.8, reflecting high severity due to the high impact on confidentiality, integrity, and availability (all rated high), low attack complexity, and no requirement for user interaction. The scope is unchanged, meaning the vulnerability affects only the vulnerable component and does not extend beyond it. Although no public exploits or patches have been reported yet, the vulnerability poses a significant risk if an attacker gains local access to the system. The lack of patches necessitates immediate attention to mitigate potential exploitation.

Potential Impact

If exploited, this vulnerability allows an attacker with local access and limited privileges to execute arbitrary code within the context of the Weave Weave Desktop application. This can lead to full compromise of the affected system, including unauthorized access to sensitive data, modification or deletion of files, installation of persistent malware, and disruption of system availability. Since the vulnerability affects the nwjs framework, which has broad capabilities, the attacker could potentially escalate privileges or move laterally within the network. Organizations relying on Weave Weave Desktop, especially in environments where local access controls are weak or where users have elevated privileges, face increased risk of data breaches, operational disruption, and compliance violations. The absence of known exploits in the wild currently limits immediate risk, but the potential for future exploitation remains high.

Mitigation Recommendations

1. Immediately restrict local access to systems running Weave Weave Desktop to trusted users only, minimizing the risk of local exploitation. 2. Monitor and audit local user activities for suspicious behavior indicative of exploitation attempts. 3. Implement application whitelisting and endpoint protection solutions that can detect and block unauthorized script execution targeting the nwjs framework. 4. Employ strict privilege management to ensure users operate with the least privileges necessary, reducing the attack surface. 5. Regularly check for official patches or updates from Weave Weave Desktop vendors and apply them promptly once available. 6. Consider isolating or sandboxing the Weave Weave Desktop application to limit the impact of potential code execution. 7. Educate users about the risks of running untrusted scripts or software locally. 8. If feasible, disable or limit the use of the nwjs framework component within the application until a patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6cb7ef31ef0b572091

Added to database: 2/25/2026, 9:45:16 PM

Last enriched: 2/28/2026, 9:49:47 AM

Last updated: 4/13/2026, 2:59:25 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses