Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50505: n/a

0
High
VulnerabilityCVE-2025-50505cvecve-2025-50505
Published: Tue Oct 07 2025 (10/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.

AI-Powered Analysis

AILast updated: 10/15/2025, 01:08:17 UTC

Technical Analysis

CVE-2025-50505 is a vulnerability affecting Clash Verge Rev versions up to 2.2.3, where the software forcibly installs a system service named clash-verge-service by default. This service exposes an unauthorized HTTP API endpoint `/start_clash` that allows local users to submit arbitrary `bin_path` parameters. These parameters are passed directly to the service process for execution without proper validation or authorization checks, leading to local privilege escalation. The vulnerability stems from improper access control and unsafe handling of input parameters (classified under CWE-250: Execution with Unnecessary Privileges). The CVSS 3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw allows a local attacker to execute arbitrary binaries with elevated privileges, potentially compromising the entire system. Although no public exploits have been reported, the lack of patches and the default enabling of the vulnerable service increase the risk. This vulnerability is particularly critical in environments where multiple users have local access or where the service runs on shared or multi-tenant systems.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially in sectors where Clash Verge is deployed on multi-user systems or critical infrastructure. Successful exploitation can lead to full system compromise, data breaches, unauthorized access to sensitive information, and disruption of services. The ability to escalate privileges locally can facilitate lateral movement within networks and undermine endpoint security. Organizations in finance, healthcare, government, and industrial control systems could face severe operational and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The absence of a patch and the default installation of the vulnerable service increase the urgency for mitigation. Given the high confidentiality, integrity, and availability impact, European entities must assess their exposure and implement controls promptly.

Mitigation Recommendations

1. Immediately audit all systems running Clash Verge Rev up to version 2.2.3 to identify vulnerable installations. 2. Disable or uninstall the clash-verge-service system service if it is not essential for operations. 3. Restrict local user permissions to prevent unauthorized access to the HTTP API endpoint `/start_clash`. 4. Employ application whitelisting to control which binaries can be executed by the service process. 5. Monitor local system logs and network traffic for suspicious activity related to the `/start_clash` endpoint or unexpected binary executions. 6. Implement strict local user access controls and limit the number of users with local access rights. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. 9. Conduct user awareness training to reduce insider threat risks. 10. For critical environments, consider isolating vulnerable systems until remediation is complete.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e51d0ca677756fc9911211

Added to database: 10/7/2025, 2:00:44 PM

Last enriched: 10/15/2025, 1:08:17 AM

Last updated: 11/22/2025, 9:09:11 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats