Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15595: CWE-1390: Weak Authentication in mlsoft Inno Setup

0
Medium
VulnerabilityCVE-2025-15595cvecve-2025-15595cwe-1390
Published: Tue Mar 03 2026 (03/03/2026, 06:13:07 UTC)
Source: CVE Database V5
Vendor/Project: mlsoft
Product: Inno Setup

Description

CVE-2025-15595 is a medium severity vulnerability in mlsoft's Inno Setup versions 6. 2. 1 and earlier, involving privilege escalation via DLL hijacking. The flaw allows a local attacker with limited privileges to escalate their rights by exploiting weak authentication mechanisms during the loading of DLLs by the installer. Exploitation requires local access and high attack complexity, with no user interaction needed. Although no known exploits are currently in the wild, the vulnerability impacts confidentiality, integrity, and availability due to potential unauthorized code execution with elevated privileges. Organizations using affected Inno Setup versions for software deployment or installation are at risk. Mitigation involves applying patches when available, restricting DLL search paths, and enforcing strict code signing and integrity checks. Countries with significant software development and distribution activities using Inno Setup, such as the United States, Germany, Japan, South Korea, and China, are more likely to be affected. The vulnerability's CVSS score is 5.

AI-Powered Analysis

AILast updated: 03/03/2026, 06:32:35 UTC

Technical Analysis

CVE-2025-15595 is a vulnerability identified in mlsoft's Inno Setup software, specifically versions 6.2.1 and earlier. The issue is categorized under CWE-1390, which relates to weak authentication mechanisms. The vulnerability manifests as a privilege escalation vector through DLL hijacking. Inno Setup, a widely used installer creation tool, loads DLLs during the installation process. Due to insufficient validation or authentication of these DLLs, a local attacker with limited privileges can place a malicious DLL in a location where the installer loads it instead of the legitimate one. This hijacking allows the attacker to execute arbitrary code with elevated privileges, potentially gaining administrative rights on the affected system. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), high attack complexity (AC:H), and privileges at a low level (PR:L), but no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:N), and the scope is high (SC:H), meaning it can affect resources beyond the initially compromised component. No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved by NCSC-FI. The lack of user interaction and the potential for privilege escalation make this a significant concern for environments where Inno Setup is used to deploy software, especially in enterprise settings.

Potential Impact

The primary impact of CVE-2025-15595 is unauthorized privilege escalation, which can lead to full system compromise. An attacker who gains local access with limited privileges can exploit this vulnerability to execute code with elevated rights, potentially installing persistent malware, altering system configurations, or accessing sensitive data. This undermines the confidentiality, integrity, and availability of affected systems. Organizations relying on Inno Setup for software deployment risk having their installation processes subverted, which could lead to widespread compromise if attackers insert malicious payloads during software installation. The vulnerability's high scope impact means that the compromise can extend beyond the installer process to other system components. Although exploitation requires local access and is complex, insider threats or attackers who have already breached perimeter defenses could leverage this vulnerability to escalate privileges and move laterally within networks. This risk is particularly critical in environments with strict privilege separation and sensitive data, such as financial institutions, government agencies, and critical infrastructure providers.

Mitigation Recommendations

To mitigate CVE-2025-15595, organizations should first monitor for and apply any official patches or updates released by mlsoft for Inno Setup. In the absence of patches, administrators should enforce strict DLL loading policies by configuring system-wide or application-specific DLL search order to prevent loading of unauthorized DLLs. This can include using Windows features such as SafeDllSearchMode and setting explicit DLL paths. Employing application whitelisting and code integrity policies (e.g., Microsoft AppLocker or Windows Defender Application Control) can prevent execution of untrusted DLLs. Additionally, restricting write permissions on directories where DLLs are loaded or placed can reduce the risk of DLL hijacking. Security teams should audit and monitor installer execution environments for anomalous DLL loads or unexpected privilege escalations. Educating developers and deployment teams about secure installer practices and avoiding running installers with unnecessary elevated privileges can further reduce risk. Finally, implementing endpoint detection and response (EDR) solutions capable of detecting suspicious DLL injection or hijacking behaviors will enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NCSC-FI
Date Reserved
2026-02-27T06:49:37.922Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a67d2dd1a09e29cbdc2f96

Added to database: 3/3/2026, 6:18:21 AM

Last enriched: 3/3/2026, 6:32:35 AM

Last updated: 3/3/2026, 7:40:17 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses