Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14498: CWE-427: Uncontrolled Search Path Element in TradingView Desktop

0
High
VulnerabilityCVE-2025-14498cvecve-2025-14498cwe-427
Published: Tue Dec 23 2025 (12/23/2025, 21:18:10 UTC)
Source: CVE Database V5
Vendor/Project: TradingView
Product: Desktop

Description

CVE-2025-14498 is a high-severity local privilege escalation vulnerability in TradingView Desktop version 2. 11. 0. 7073, caused by an uncontrolled search path element in the Electron framework configuration. An attacker with low-privileged code execution on the target system can exploit this flaw to escalate privileges and execute arbitrary code with higher user rights. The vulnerability arises because the application loads a script from an unsecured location, enabling code injection. No user interaction is required, but initial low-level code execution is a prerequisite. There are no known exploits in the wild yet, and no patches have been released at the time of publication. European organizations using TradingView Desktop, especially in financial sectors, are at risk. Mitigation involves restricting local code execution capabilities, monitoring for suspicious script loading, and applying vendor updates once available.

AI-Powered Analysis

AILast updated: 12/31/2025, 00:21:05 UTC

Technical Analysis

CVE-2025-14498 is a vulnerability identified in TradingView Desktop version 2.11.0.7073, which is built on the Electron framework. The flaw is categorized under CWE-427, indicating an uncontrolled search path element issue. Specifically, the application improperly loads a script file from an unsecured or untrusted location within its Electron configuration. This misconfiguration allows a local attacker, who already has the ability to execute code with limited privileges on the system, to escalate their privileges by injecting malicious code through the manipulated search path. The vulnerability does not require user interaction but does require the attacker to have some initial foothold on the system. Exploiting this vulnerability could lead to arbitrary code execution with elevated privileges, compromising confidentiality, integrity, and availability of the affected system. The CVSS v3.0 base score is 7.8, reflecting high severity due to the combination of local attack vector, low complexity, required privileges, and high impact on confidentiality, integrity, and availability. No public exploits or patches are currently available, but the vulnerability was published by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-27395. The flaw stems from Electron’s handling of script loading paths, a common vector for local privilege escalation when applications do not securely validate or restrict search paths for executable components.

Potential Impact

For European organizations, particularly those in the financial sector that rely on TradingView Desktop for market analysis and trading activities, this vulnerability poses a significant risk. Successful exploitation could allow attackers to gain elevated privileges on affected systems, potentially leading to unauthorized access to sensitive financial data, manipulation of trading activities, or disruption of business operations. The compromise of user accounts with elevated privileges could facilitate lateral movement within corporate networks, increasing the risk of broader organizational impact. Given TradingView’s popularity among traders and financial analysts, the confidentiality and integrity of critical financial information could be jeopardized. Additionally, the availability of affected systems could be impacted if attackers deploy destructive payloads or ransomware. The requirement for initial local code execution means that organizations with weak endpoint security or those susceptible to phishing or malware infections are at higher risk. The absence of a patch at the time of disclosure further elevates the urgency for proactive mitigation.

Mitigation Recommendations

1. Restrict local user permissions to minimize the ability to execute unauthorized code, especially on systems running TradingView Desktop. 2. Implement application whitelisting to prevent execution of untrusted scripts or binaries in directories used by TradingView Desktop or Electron. 3. Monitor file system and process activity for unusual script loading or execution patterns related to TradingView Desktop. 4. Employ endpoint detection and response (EDR) solutions to detect and block privilege escalation attempts. 5. Educate users to avoid executing untrusted code and maintain strong endpoint security hygiene to prevent initial foothold by attackers. 6. Regularly audit and harden Electron application configurations to ensure secure search paths and script loading practices. 7. Stay alert for vendor updates or patches from TradingView and apply them promptly once available. 8. Consider isolating TradingView Desktop usage to dedicated, hardened environments to limit potential impact. 9. Use network segmentation to restrict lateral movement if a local compromise occurs. 10. Conduct penetration testing and vulnerability assessments focusing on local privilege escalation vectors within critical user environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-10T20:31:28.019Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b0a18d69af40f312b7e41

Added to database: 12/23/2025, 9:31:04 PM

Last enriched: 12/31/2025, 12:21:05 AM

Last updated: 2/5/2026, 6:24:53 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats