Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66005: CWE-863: Improper Authorization in https://github.com/ShadowBlip inputplumber

0
High
VulnerabilityCVE-2025-66005cvecve-2025-66005cwe-863
Published: Wed Jan 14 2026 (01/14/2026, 11:53:49 UTC)
Source: CVE Database V5
Vendor/Project: https://github.com/ShadowBlip
Product: inputplumber

Description

CVE-2025-66005 is a high-severity vulnerability in InputPlumber prior to version 0. 63. 0, caused by improper authorization of the InputManager D-Bus interface. This flaw allows local attackers to cause denial-of-service, leak sensitive information, or escalate privileges within the active user session. Exploitation requires local access and some user interaction but no prior authentication. The vulnerability affects the confidentiality, integrity, and availability of affected systems. Although no known exploits are reported in the wild, the high CVSS score (8. 5) indicates significant risk. European organizations using InputPlumber, especially in Linux environments where D-Bus is prevalent, should prioritize patching and access control. Countries with strong Linux adoption in critical infrastructure and technology sectors, such as Germany, France, and the Netherlands, are likely most impacted.

AI-Powered Analysis

AILast updated: 01/14/2026, 12:17:09 UTC

Technical Analysis

CVE-2025-66005 is a vulnerability classified under CWE-863 (Improper Authorization) affecting InputPlumber, an open-source tool hosted on GitHub by ShadowBlip. The issue arises from the lack of proper authorization checks on the InputManager D-Bus interface in InputPlumber versions before 0.63.0. D-Bus is a widely used inter-process communication system in Linux environments, enabling different software components to communicate. Improper authorization on this interface means that any local user with access to the session bus can invoke privileged operations without sufficient permission checks. This can lead to multiple attack vectors: local denial-of-service by disrupting input management, information disclosure by accessing sensitive session data, or privilege escalation by executing commands with higher privileges within the active user session. The vulnerability does not require prior authentication but does require local access and some user interaction, such as running a crafted command or script. The CVSS 4.0 score of 8.5 reflects a high severity due to the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no privileges required. No public exploits have been reported yet, but the potential for damage is significant, especially in multi-user or shared environments. The vulnerability was reserved in November 2025 and published in January 2026, indicating recent discovery and disclosure. The absence of patch links suggests that users must monitor the official repository for updates or apply mitigations manually. This vulnerability highlights the critical need for robust authorization mechanisms on IPC interfaces like D-Bus to prevent local privilege escalation and session compromise.

Potential Impact

For European organizations, the impact of CVE-2025-66005 can be substantial, particularly in sectors relying heavily on Linux-based systems and multi-user environments such as research institutions, telecommunications, and critical infrastructure. Exploitation could allow malicious insiders or compromised local users to disrupt services (denial-of-service), access confidential session data, or escalate privileges to perform unauthorized actions, potentially leading to broader system compromise. This is especially concerning in environments where InputPlumber manages input devices or session controls, as attackers could manipulate user input or capture sensitive information. The vulnerability undermines the security assumptions of session isolation and user privilege boundaries, increasing the risk of lateral movement and data breaches. Given the high CVSS score and the nature of the flaw, organizations face risks to confidentiality, integrity, and availability of their systems. The lack of known exploits in the wild provides a window for proactive defense, but the vulnerability’s presence in open-source software used across various distributions means the attack surface is broad. European entities with stringent data protection regulations (e.g., GDPR) must consider the potential compliance and reputational risks arising from exploitation.

Mitigation Recommendations

1. Upgrade InputPlumber to version 0.63.0 or later as soon as it becomes available to ensure the authorization flaw is patched. 2. Until patches are applied, restrict local access to the D-Bus session bus and the InputManager interface by enforcing strict Linux user permissions and access control lists (ACLs). 3. Implement mandatory access control (MAC) frameworks such as SELinux or AppArmor to confine InputPlumber and limit its interaction scope. 4. Monitor local user activities and audit D-Bus calls related to InputManager for unusual or unauthorized access patterns. 5. Educate system administrators and users about the risks of running untrusted local code or scripts that could exploit this vulnerability. 6. Consider isolating critical user sessions or input management services in containers or sandboxes to reduce the impact of potential exploitation. 7. Regularly review and harden IPC mechanisms and authorization policies in multi-user Linux environments to prevent similar flaws. 8. Coordinate with Linux distribution maintainers and security teams to track patch releases and advisories related to InputPlumber.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2025-11-19T08:52:54.077Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696785e78330e06716fcefd9

Added to database: 1/14/2026, 12:02:47 PM

Last enriched: 1/14/2026, 12:17:09 PM

Last updated: 1/14/2026, 1:09:20 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats