CVE-2025-50505: n/a
Clash Verge Rev thru 2.2.3 (fixed in 2.3.0) forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
AI Analysis
Technical Summary
CVE-2025-50505 is a local privilege escalation vulnerability affecting Clash Verge software versions through 2.2.3, resolved in version 2.3.0. Clash Verge installs a system-level service named clash-verge-service by default, which exposes an unauthorized HTTP API endpoint `/start_clash` accessible only locally. This endpoint accepts a parameter called bin_path, which specifies a binary path that the service executes without sufficient validation or sanitization. Because the service runs with elevated privileges, a local attacker can exploit this flaw by submitting a crafted bin_path to execute arbitrary code with higher privileges. This vulnerability is categorized under CWE-250 (Execution with Unnecessary Privileges), highlighting improper privilege management. The CVSS 3.1 base score of 7.8 reflects high severity due to the combination of local attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability. While no public exploits have been reported, the vulnerability poses a significant risk in environments where local user accounts are not tightly controlled. The flaw underscores the risk of exposing powerful service APIs without authentication or input validation, enabling privilege escalation on affected systems.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized privilege escalation on systems running vulnerable versions of Clash Verge, potentially allowing attackers to gain administrative control. This can result in data breaches, unauthorized system modifications, and disruption of critical services. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Clash Verge for network or application management may face increased risk of insider threats or lateral movement by attackers who have gained local access. The vulnerability’s local nature limits remote exploitation but does not eliminate risk in environments with multiple users or where attackers can gain initial footholds through other means. The high impact on confidentiality, integrity, and availability means that exploitation could compromise sensitive data, disrupt operations, and undermine trust in affected systems. European entities with less stringent local user controls or legacy deployments of Clash Verge are particularly vulnerable.
Mitigation Recommendations
European organizations should immediately upgrade Clash Verge to version 2.3.0 or later, where this vulnerability is fixed. Until upgrading, restrict local user access to systems running vulnerable versions to trusted personnel only. Disable or firewall local HTTP API endpoints such as `/start_clash` to prevent unauthorized local access. Implement strict application whitelisting and monitoring to detect unusual execution of binaries initiated by the clash-verge-service. Conduct regular audits of installed services and their exposed interfaces to identify unauthorized or insecure configurations. Employ endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation attempts. Additionally, enforce the principle of least privilege for all local accounts and consider using containerization or sandboxing to limit the impact of potential exploits. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable installations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-50505: n/a
Description
Clash Verge Rev thru 2.2.3 (fixed in 2.3.0) forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2025-50505 is a local privilege escalation vulnerability affecting Clash Verge software versions through 2.2.3, resolved in version 2.3.0. Clash Verge installs a system-level service named clash-verge-service by default, which exposes an unauthorized HTTP API endpoint `/start_clash` accessible only locally. This endpoint accepts a parameter called bin_path, which specifies a binary path that the service executes without sufficient validation or sanitization. Because the service runs with elevated privileges, a local attacker can exploit this flaw by submitting a crafted bin_path to execute arbitrary code with higher privileges. This vulnerability is categorized under CWE-250 (Execution with Unnecessary Privileges), highlighting improper privilege management. The CVSS 3.1 base score of 7.8 reflects high severity due to the combination of local attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability. While no public exploits have been reported, the vulnerability poses a significant risk in environments where local user accounts are not tightly controlled. The flaw underscores the risk of exposing powerful service APIs without authentication or input validation, enabling privilege escalation on affected systems.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized privilege escalation on systems running vulnerable versions of Clash Verge, potentially allowing attackers to gain administrative control. This can result in data breaches, unauthorized system modifications, and disruption of critical services. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Clash Verge for network or application management may face increased risk of insider threats or lateral movement by attackers who have gained local access. The vulnerability’s local nature limits remote exploitation but does not eliminate risk in environments with multiple users or where attackers can gain initial footholds through other means. The high impact on confidentiality, integrity, and availability means that exploitation could compromise sensitive data, disrupt operations, and undermine trust in affected systems. European entities with less stringent local user controls or legacy deployments of Clash Verge are particularly vulnerable.
Mitigation Recommendations
European organizations should immediately upgrade Clash Verge to version 2.3.0 or later, where this vulnerability is fixed. Until upgrading, restrict local user access to systems running vulnerable versions to trusted personnel only. Disable or firewall local HTTP API endpoints such as `/start_clash` to prevent unauthorized local access. Implement strict application whitelisting and monitoring to detect unusual execution of binaries initiated by the clash-verge-service. Conduct regular audits of installed services and their exposed interfaces to identify unauthorized or insecure configurations. Employ endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation attempts. Additionally, enforce the principle of least privilege for all local accounts and consider using containerization or sandboxing to limit the impact of potential exploits. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable installations.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68e51d0ca677756fc9911211
Added to database: 10/7/2025, 2:00:44 PM
Last enriched: 1/21/2026, 7:13:52 PM
Last updated: 2/7/2026, 9:29:57 AM
Views: 199
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.