Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65199: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Windscribe Windscribe for Linux Desktop App

0
High
VulnerabilityCVE-2025-65199cvecve-2025-65199cwe-78
Published: Wed Dec 10 2025 (12/10/2025, 18:04:35 UTC)
Source: CVE Database V5
Vendor/Project: Windscribe
Product: Windscribe for Linux Desktop App

Description

A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.

AI-Powered Analysis

AILast updated: 12/19/2025, 04:17:55 UTC

Technical Analysis

CVE-2025-65199 is an OS command injection vulnerability classified under CWE-78 found in the Windscribe for Linux Desktop App, specifically in versions 2.10.1. The vulnerability arises from improper neutralization of special elements in the 'adapterName' parameter of the 'changeMTU' function, which is used to modify the Maximum Transmission Unit settings. A local attacker who is a member of the 'windscribe' group can exploit this flaw to inject arbitrary OS commands that are executed with root privileges. This occurs because the input passed to the 'changeMTU' function is not properly sanitized before being used in system-level command execution, allowing command chaining or injection. The vulnerability does not require user interaction but does require the attacker to have local access and membership in the windscribe group, which is typically granted to users who manage or use the Windscribe VPN client. The impact of this vulnerability is severe, as it compromises confidentiality, integrity, and availability by enabling full root-level control over the affected system. The vendor has addressed this issue in versions 2.18.3-alpha and 2.18.8 by implementing proper input validation and sanitization. No public exploits have been reported yet, but the vulnerability's characteristics make it a critical concern for environments where Windscribe Linux clients are deployed.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for local privilege escalation to root, enabling attackers to execute arbitrary commands, install malware, or disrupt services. Organizations using Windscribe on Linux endpoints, particularly in development, research, or privacy-focused sectors, could face data breaches, system compromise, or operational downtime. The threat is heightened in environments where multiple users share systems or where the windscribe group membership is not tightly controlled. Given the VPN client’s role in securing communications, exploitation could also undermine network security by allowing attackers to manipulate or intercept VPN traffic. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability’s ease of exploitation and high impact necessitate prompt remediation to prevent future attacks.

Mitigation Recommendations

1. Upgrade all Windscribe for Linux Desktop App installations to version 2.18.3-alpha or later, or 2.18.8 or later, where the vulnerability is patched. 2. Audit and restrict membership of the 'windscribe' group to only trusted and necessary users to minimize the attack surface. 3. Implement strict local access controls and monitoring to detect unauthorized attempts to exploit the vulnerability. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to identify anomalous command execution patterns. 5. Educate system administrators and users about the risks of privilege escalation vulnerabilities and the importance of applying security updates promptly. 6. Consider isolating VPN client usage to dedicated systems or containers to limit potential lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2025-11-18T07:05:42.386Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939ba1ffe7b3954b68b96e0

Added to database: 12/10/2025, 6:21:19 PM

Last enriched: 12/19/2025, 4:17:55 AM

Last updated: 2/5/2026, 10:55:12 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats