CVE-2025-65199: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Windscribe Windscribe for Linux Desktop App
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.
AI Analysis
Technical Summary
CVE-2025-65199 is an OS command injection vulnerability classified under CWE-78 found in the Windscribe for Linux Desktop App, specifically in versions 2.10.1. The vulnerability arises from improper neutralization of special elements in the 'adapterName' parameter of the 'changeMTU' function, which is used to modify the Maximum Transmission Unit settings. A local attacker who is a member of the 'windscribe' group can exploit this flaw to inject arbitrary OS commands that are executed with root privileges. This occurs because the input passed to the 'changeMTU' function is not properly sanitized before being used in system-level command execution, allowing command chaining or injection. The vulnerability does not require user interaction but does require the attacker to have local access and membership in the windscribe group, which is typically granted to users who manage or use the Windscribe VPN client. The impact of this vulnerability is severe, as it compromises confidentiality, integrity, and availability by enabling full root-level control over the affected system. The vendor has addressed this issue in versions 2.18.3-alpha and 2.18.8 by implementing proper input validation and sanitization. No public exploits have been reported yet, but the vulnerability's characteristics make it a critical concern for environments where Windscribe Linux clients are deployed.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for local privilege escalation to root, enabling attackers to execute arbitrary commands, install malware, or disrupt services. Organizations using Windscribe on Linux endpoints, particularly in development, research, or privacy-focused sectors, could face data breaches, system compromise, or operational downtime. The threat is heightened in environments where multiple users share systems or where the windscribe group membership is not tightly controlled. Given the VPN client’s role in securing communications, exploitation could also undermine network security by allowing attackers to manipulate or intercept VPN traffic. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability’s ease of exploitation and high impact necessitate prompt remediation to prevent future attacks.
Mitigation Recommendations
1. Upgrade all Windscribe for Linux Desktop App installations to version 2.18.3-alpha or later, or 2.18.8 or later, where the vulnerability is patched. 2. Audit and restrict membership of the 'windscribe' group to only trusted and necessary users to minimize the attack surface. 3. Implement strict local access controls and monitoring to detect unauthorized attempts to exploit the vulnerability. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to identify anomalous command execution patterns. 5. Educate system administrators and users about the risks of privilege escalation vulnerabilities and the importance of applying security updates promptly. 6. Consider isolating VPN client usage to dedicated systems or containers to limit potential lateral movement in case of compromise.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2025-65199: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Windscribe Windscribe for Linux Desktop App
Description
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-65199 is an OS command injection vulnerability classified under CWE-78 found in the Windscribe for Linux Desktop App, specifically in versions 2.10.1. The vulnerability arises from improper neutralization of special elements in the 'adapterName' parameter of the 'changeMTU' function, which is used to modify the Maximum Transmission Unit settings. A local attacker who is a member of the 'windscribe' group can exploit this flaw to inject arbitrary OS commands that are executed with root privileges. This occurs because the input passed to the 'changeMTU' function is not properly sanitized before being used in system-level command execution, allowing command chaining or injection. The vulnerability does not require user interaction but does require the attacker to have local access and membership in the windscribe group, which is typically granted to users who manage or use the Windscribe VPN client. The impact of this vulnerability is severe, as it compromises confidentiality, integrity, and availability by enabling full root-level control over the affected system. The vendor has addressed this issue in versions 2.18.3-alpha and 2.18.8 by implementing proper input validation and sanitization. No public exploits have been reported yet, but the vulnerability's characteristics make it a critical concern for environments where Windscribe Linux clients are deployed.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for local privilege escalation to root, enabling attackers to execute arbitrary commands, install malware, or disrupt services. Organizations using Windscribe on Linux endpoints, particularly in development, research, or privacy-focused sectors, could face data breaches, system compromise, or operational downtime. The threat is heightened in environments where multiple users share systems or where the windscribe group membership is not tightly controlled. Given the VPN client’s role in securing communications, exploitation could also undermine network security by allowing attackers to manipulate or intercept VPN traffic. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability’s ease of exploitation and high impact necessitate prompt remediation to prevent future attacks.
Mitigation Recommendations
1. Upgrade all Windscribe for Linux Desktop App installations to version 2.18.3-alpha or later, or 2.18.8 or later, where the vulnerability is patched. 2. Audit and restrict membership of the 'windscribe' group to only trusted and necessary users to minimize the attack surface. 3. Implement strict local access controls and monitoring to detect unauthorized attempts to exploit the vulnerability. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to identify anomalous command execution patterns. 5. Educate system administrators and users about the risks of privilege escalation vulnerabilities and the importance of applying security updates promptly. 6. Consider isolating VPN client usage to dedicated systems or containers to limit potential lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-11-18T07:05:42.386Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939ba1ffe7b3954b68b96e0
Added to database: 12/10/2025, 6:21:19 PM
Last enriched: 12/19/2025, 4:17:55 AM
Last updated: 2/5/2026, 10:55:12 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Cisco, F5 Patch High-Severity Vulnerabilities
HighCVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumCVE-2026-1294: CWE-918 Server-Side Request Forgery (SSRF) in bplugins All In One Image Viewer Block – Gutenberg block to create image viewer with hyperlink
HighCVE-2026-1271: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-14079: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.