CVE-2025-50505: n/a
Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
AI Analysis
Technical Summary
CVE-2025-50505 is a vulnerability affecting Clash Verge Rev versions up to 2.2.3, where the software forcibly installs a system service named clash-verge-service by default. This service exposes an unauthorized HTTP API endpoint `/start_clash` that allows local users to submit arbitrary `bin_path` parameters. These parameters are passed directly to the service process for execution without proper validation or authorization checks, leading to local privilege escalation. The vulnerability stems from improper access control and unsafe handling of input parameters (classified under CWE-250: Execution with Unnecessary Privileges). The CVSS 3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw allows a local attacker to execute arbitrary binaries with elevated privileges, potentially compromising the entire system. Although no public exploits have been reported, the lack of patches and the default enabling of the vulnerable service increase the risk. This vulnerability is particularly critical in environments where multiple users have local access or where the service runs on shared or multi-tenant systems.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially in sectors where Clash Verge is deployed on multi-user systems or critical infrastructure. Successful exploitation can lead to full system compromise, data breaches, unauthorized access to sensitive information, and disruption of services. The ability to escalate privileges locally can facilitate lateral movement within networks and undermine endpoint security. Organizations in finance, healthcare, government, and industrial control systems could face severe operational and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The absence of a patch and the default installation of the vulnerable service increase the urgency for mitigation. Given the high confidentiality, integrity, and availability impact, European entities must assess their exposure and implement controls promptly.
Mitigation Recommendations
1. Immediately audit all systems running Clash Verge Rev up to version 2.2.3 to identify vulnerable installations. 2. Disable or uninstall the clash-verge-service system service if it is not essential for operations. 3. Restrict local user permissions to prevent unauthorized access to the HTTP API endpoint `/start_clash`. 4. Employ application whitelisting to control which binaries can be executed by the service process. 5. Monitor local system logs and network traffic for suspicious activity related to the `/start_clash` endpoint or unexpected binary executions. 6. Implement strict local user access controls and limit the number of users with local access rights. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. 9. Conduct user awareness training to reduce insider threat risks. 10. For critical environments, consider isolating vulnerable systems until remediation is complete.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-50505: n/a
Description
Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2025-50505 is a vulnerability affecting Clash Verge Rev versions up to 2.2.3, where the software forcibly installs a system service named clash-verge-service by default. This service exposes an unauthorized HTTP API endpoint `/start_clash` that allows local users to submit arbitrary `bin_path` parameters. These parameters are passed directly to the service process for execution without proper validation or authorization checks, leading to local privilege escalation. The vulnerability stems from improper access control and unsafe handling of input parameters (classified under CWE-250: Execution with Unnecessary Privileges). The CVSS 3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw allows a local attacker to execute arbitrary binaries with elevated privileges, potentially compromising the entire system. Although no public exploits have been reported, the lack of patches and the default enabling of the vulnerable service increase the risk. This vulnerability is particularly critical in environments where multiple users have local access or where the service runs on shared or multi-tenant systems.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially in sectors where Clash Verge is deployed on multi-user systems or critical infrastructure. Successful exploitation can lead to full system compromise, data breaches, unauthorized access to sensitive information, and disruption of services. The ability to escalate privileges locally can facilitate lateral movement within networks and undermine endpoint security. Organizations in finance, healthcare, government, and industrial control systems could face severe operational and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The absence of a patch and the default installation of the vulnerable service increase the urgency for mitigation. Given the high confidentiality, integrity, and availability impact, European entities must assess their exposure and implement controls promptly.
Mitigation Recommendations
1. Immediately audit all systems running Clash Verge Rev up to version 2.2.3 to identify vulnerable installations. 2. Disable or uninstall the clash-verge-service system service if it is not essential for operations. 3. Restrict local user permissions to prevent unauthorized access to the HTTP API endpoint `/start_clash`. 4. Employ application whitelisting to control which binaries can be executed by the service process. 5. Monitor local system logs and network traffic for suspicious activity related to the `/start_clash` endpoint or unexpected binary executions. 6. Implement strict local user access controls and limit the number of users with local access rights. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. 9. Conduct user awareness training to reduce insider threat risks. 10. For critical environments, consider isolating vulnerable systems until remediation is complete.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68e51d0ca677756fc9911211
Added to database: 10/7/2025, 2:00:44 PM
Last enriched: 10/15/2025, 1:08:17 AM
Last updated: 1/8/2026, 7:03:30 AM
Views: 141
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-22581
LowCVE-2026-22580
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.