Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65199: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Windscribe Windscribe for Linux Desktop App

0
High
VulnerabilityCVE-2025-65199cvecve-2025-65199cwe-78
Published: Wed Dec 10 2025 (12/10/2025, 18:04:35 UTC)
Source: CVE Database V5
Vendor/Project: Windscribe
Product: Windscribe for Linux Desktop App

Description

A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.

AI-Powered Analysis

AILast updated: 12/10/2025, 18:36:06 UTC

Technical Analysis

CVE-2025-65199 is an OS command injection vulnerability classified under CWE-78, affecting the Windscribe Linux Desktop App, specifically versions 2.10.1. The flaw exists in the 'changeMTU' function, where the 'adapterName' parameter is improperly sanitized, allowing a local user who is a member of the 'windscribe' group to inject arbitrary OS commands. Because the application executes these commands with root privileges, successful exploitation results in full system compromise. The vulnerability requires local access and group membership, but no additional user interaction, making it a privilege escalation vector. The CVSS v3.1 score is 7.8 (high), reflecting the ease of exploitation with low attack complexity and the severe impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on December 10, 2025, and fixed in Windscribe versions 2.18.3-alpha and 2.18.8. No known exploits have been reported in the wild, but the potential for abuse is significant given the root-level command execution capability. The flaw highlights the importance of proper input validation and sanitization in security-sensitive functions, especially those running with elevated privileges.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those using Windscribe Linux clients for secure communications or privacy. Exploitation could lead to complete system compromise, allowing attackers to access sensitive data, disrupt services, or use the compromised system as a foothold for lateral movement within networks. The requirement for local access and group membership limits remote exploitation but insider threats or compromised user accounts could leverage this vulnerability. Organizations relying on Linux endpoints for critical operations or handling sensitive information could face data breaches, operational disruptions, and reputational damage. Additionally, the root-level access gained could bypass many security controls, making detection and remediation more difficult. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.

Mitigation Recommendations

Organizations should immediately upgrade affected Windscribe Linux Desktop App installations to versions 2.18.3-alpha or 2.18.8 or later. Until patching is complete, restrict membership of the 'windscribe' group to trusted administrators only, minimizing the number of users who can exploit this vulnerability. Implement strict access controls and monitor group membership changes. Employ host-based intrusion detection systems (HIDS) to detect anomalous command executions or privilege escalations. Conduct regular audits of Linux endpoints to identify outdated Windscribe versions. Consider disabling or uninstalling Windscribe on Linux systems where it is not essential. Additionally, enforce the principle of least privilege for all users and services to reduce the attack surface. Educate users about the risks of local privilege escalation vulnerabilities and encourage prompt reporting of suspicious activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2025-11-18T07:05:42.386Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939ba1ffe7b3954b68b96e0

Added to database: 12/10/2025, 6:21:19 PM

Last enriched: 12/10/2025, 6:36:06 PM

Last updated: 12/11/2025, 6:41:10 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats