Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50505: n/a

0
High
VulnerabilityCVE-2025-50505cvecve-2025-50505
Published: Tue Oct 07 2025 (10/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Clash Verge Rev thru 2.2.3 (fixed in 2.3.0) forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.

AI-Powered Analysis

AILast updated: 01/21/2026, 19:13:52 UTC

Technical Analysis

CVE-2025-50505 is a local privilege escalation vulnerability affecting Clash Verge software versions through 2.2.3, resolved in version 2.3.0. Clash Verge installs a system-level service named clash-verge-service by default, which exposes an unauthorized HTTP API endpoint `/start_clash` accessible only locally. This endpoint accepts a parameter called bin_path, which specifies a binary path that the service executes without sufficient validation or sanitization. Because the service runs with elevated privileges, a local attacker can exploit this flaw by submitting a crafted bin_path to execute arbitrary code with higher privileges. This vulnerability is categorized under CWE-250 (Execution with Unnecessary Privileges), highlighting improper privilege management. The CVSS 3.1 base score of 7.8 reflects high severity due to the combination of local attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability. While no public exploits have been reported, the vulnerability poses a significant risk in environments where local user accounts are not tightly controlled. The flaw underscores the risk of exposing powerful service APIs without authentication or input validation, enabling privilege escalation on affected systems.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized privilege escalation on systems running vulnerable versions of Clash Verge, potentially allowing attackers to gain administrative control. This can result in data breaches, unauthorized system modifications, and disruption of critical services. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Clash Verge for network or application management may face increased risk of insider threats or lateral movement by attackers who have gained local access. The vulnerability’s local nature limits remote exploitation but does not eliminate risk in environments with multiple users or where attackers can gain initial footholds through other means. The high impact on confidentiality, integrity, and availability means that exploitation could compromise sensitive data, disrupt operations, and undermine trust in affected systems. European entities with less stringent local user controls or legacy deployments of Clash Verge are particularly vulnerable.

Mitigation Recommendations

European organizations should immediately upgrade Clash Verge to version 2.3.0 or later, where this vulnerability is fixed. Until upgrading, restrict local user access to systems running vulnerable versions to trusted personnel only. Disable or firewall local HTTP API endpoints such as `/start_clash` to prevent unauthorized local access. Implement strict application whitelisting and monitoring to detect unusual execution of binaries initiated by the clash-verge-service. Conduct regular audits of installed services and their exposed interfaces to identify unauthorized or insecure configurations. Employ endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation attempts. Additionally, enforce the principle of least privilege for all local accounts and consider using containerization or sandboxing to limit the impact of potential exploits. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable installations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e51d0ca677756fc9911211

Added to database: 10/7/2025, 2:00:44 PM

Last enriched: 1/21/2026, 7:13:52 PM

Last updated: 2/7/2026, 9:29:57 AM

Views: 199

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats