CVE-2025-50505: n/a
Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
AI Analysis
Technical Summary
CVE-2025-50505 is a vulnerability affecting Clash Verge Rev versions up to 2.2.3, where the software forcibly installs a system service named clash-verge-service by default. This service exposes an unauthorized HTTP API endpoint `/start_clash` that allows local users to submit arbitrary `bin_path` parameters. These parameters are passed directly to the service process for execution without proper validation or authorization checks, leading to local privilege escalation. The vulnerability stems from improper access control and unsafe handling of input parameters (classified under CWE-250: Execution with Unnecessary Privileges). The CVSS 3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw allows a local attacker to execute arbitrary binaries with elevated privileges, potentially compromising the entire system. Although no public exploits have been reported, the lack of patches and the default enabling of the vulnerable service increase the risk. This vulnerability is particularly critical in environments where multiple users have local access or where the service runs on shared or multi-tenant systems.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially in sectors where Clash Verge is deployed on multi-user systems or critical infrastructure. Successful exploitation can lead to full system compromise, data breaches, unauthorized access to sensitive information, and disruption of services. The ability to escalate privileges locally can facilitate lateral movement within networks and undermine endpoint security. Organizations in finance, healthcare, government, and industrial control systems could face severe operational and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The absence of a patch and the default installation of the vulnerable service increase the urgency for mitigation. Given the high confidentiality, integrity, and availability impact, European entities must assess their exposure and implement controls promptly.
Mitigation Recommendations
1. Immediately audit all systems running Clash Verge Rev up to version 2.2.3 to identify vulnerable installations. 2. Disable or uninstall the clash-verge-service system service if it is not essential for operations. 3. Restrict local user permissions to prevent unauthorized access to the HTTP API endpoint `/start_clash`. 4. Employ application whitelisting to control which binaries can be executed by the service process. 5. Monitor local system logs and network traffic for suspicious activity related to the `/start_clash` endpoint or unexpected binary executions. 6. Implement strict local user access controls and limit the number of users with local access rights. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. 9. Conduct user awareness training to reduce insider threat risks. 10. For critical environments, consider isolating vulnerable systems until remediation is complete.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-50505: n/a
Description
Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2025-50505 is a vulnerability affecting Clash Verge Rev versions up to 2.2.3, where the software forcibly installs a system service named clash-verge-service by default. This service exposes an unauthorized HTTP API endpoint `/start_clash` that allows local users to submit arbitrary `bin_path` parameters. These parameters are passed directly to the service process for execution without proper validation or authorization checks, leading to local privilege escalation. The vulnerability stems from improper access control and unsafe handling of input parameters (classified under CWE-250: Execution with Unnecessary Privileges). The CVSS 3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw allows a local attacker to execute arbitrary binaries with elevated privileges, potentially compromising the entire system. Although no public exploits have been reported, the lack of patches and the default enabling of the vulnerable service increase the risk. This vulnerability is particularly critical in environments where multiple users have local access or where the service runs on shared or multi-tenant systems.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially in sectors where Clash Verge is deployed on multi-user systems or critical infrastructure. Successful exploitation can lead to full system compromise, data breaches, unauthorized access to sensitive information, and disruption of services. The ability to escalate privileges locally can facilitate lateral movement within networks and undermine endpoint security. Organizations in finance, healthcare, government, and industrial control systems could face severe operational and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The absence of a patch and the default installation of the vulnerable service increase the urgency for mitigation. Given the high confidentiality, integrity, and availability impact, European entities must assess their exposure and implement controls promptly.
Mitigation Recommendations
1. Immediately audit all systems running Clash Verge Rev up to version 2.2.3 to identify vulnerable installations. 2. Disable or uninstall the clash-verge-service system service if it is not essential for operations. 3. Restrict local user permissions to prevent unauthorized access to the HTTP API endpoint `/start_clash`. 4. Employ application whitelisting to control which binaries can be executed by the service process. 5. Monitor local system logs and network traffic for suspicious activity related to the `/start_clash` endpoint or unexpected binary executions. 6. Implement strict local user access controls and limit the number of users with local access rights. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. 9. Conduct user awareness training to reduce insider threat risks. 10. For critical environments, consider isolating vulnerable systems until remediation is complete.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68e51d0ca677756fc9911211
Added to database: 10/7/2025, 2:00:44 PM
Last enriched: 10/15/2025, 1:08:17 AM
Last updated: 11/22/2025, 9:09:11 PM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.