CVE-2025-67905: n/a
Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flow.
AI Analysis
Technical Summary
CVE-2025-67905 is a privilege escalation vulnerability affecting Malwarebytes AdwCleaner versions before 8.7.0. The core issue arises because AdwCleaner runs with Administrator privileges and performs log file deletions in an insecure manner where the target log file location is controllable by a non-administrative user. This allows an attacker with limited privileges to create a symbolic link (symlink) that redirects the log file deletion operation to an arbitrary system file. By carefully crafting this symlink, the attacker can cause the application to delete or modify critical system files, effectively escalating their privileges to SYSTEM level. The vulnerability is similar in nature to CVE-2023-28892, which also involved insecure file operations leading to privilege escalation. Exploitation requires the attacker to place a file in a specific folder path and intercept the log deletion flow, but does not require user interaction beyond that. The CVSS v3.1 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and the need for only low privileges to start the attack. No known public exploits have been reported yet, but the vulnerability poses a significant risk due to the high privileges of the affected process and the potential for full system compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where Malwarebytes AdwCleaner is deployed for malware remediation. Successful exploitation can lead to full SYSTEM-level compromise, allowing attackers to bypass security controls, install persistent malware, steal sensitive data, or disrupt system operations. This can impact confidentiality by exposing sensitive information, integrity by allowing unauthorized modifications to system files, and availability by potentially causing system instability or denial of service. Organizations in sectors with high regulatory requirements such as finance, healthcare, and critical infrastructure could face severe compliance and operational consequences. The vulnerability is particularly concerning in multi-user environments where non-admin users have local access, such as corporate desktops or shared workstations. Given the widespread use of Malwarebytes products in Europe, the threat surface is considerable.
Mitigation Recommendations
1. Upgrade Malwarebytes AdwCleaner to version 8.7.0 or later where this vulnerability is fixed. 2. Until patching is possible, restrict local user permissions to prevent unauthorized file creation in the folders targeted by AdwCleaner’s log deletion process. 3. Implement application whitelisting and endpoint protection to detect and block suspicious symbolic link creation or manipulation. 4. Monitor file system activity for unusual symlink creation or deletion operations in directories used by AdwCleaner. 5. Use Group Policy or endpoint management tools to enforce least privilege principles and limit administrative rights on endpoints. 6. Educate users about the risks of local privilege escalation and enforce strict access controls on shared machines. 7. Regularly audit installed software versions and patch management processes to ensure timely updates of security-critical applications.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-67905: n/a
Description
Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flow.
AI-Powered Analysis
Technical Analysis
CVE-2025-67905 is a privilege escalation vulnerability affecting Malwarebytes AdwCleaner versions before 8.7.0. The core issue arises because AdwCleaner runs with Administrator privileges and performs log file deletions in an insecure manner where the target log file location is controllable by a non-administrative user. This allows an attacker with limited privileges to create a symbolic link (symlink) that redirects the log file deletion operation to an arbitrary system file. By carefully crafting this symlink, the attacker can cause the application to delete or modify critical system files, effectively escalating their privileges to SYSTEM level. The vulnerability is similar in nature to CVE-2023-28892, which also involved insecure file operations leading to privilege escalation. Exploitation requires the attacker to place a file in a specific folder path and intercept the log deletion flow, but does not require user interaction beyond that. The CVSS v3.1 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and the need for only low privileges to start the attack. No known public exploits have been reported yet, but the vulnerability poses a significant risk due to the high privileges of the affected process and the potential for full system compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where Malwarebytes AdwCleaner is deployed for malware remediation. Successful exploitation can lead to full SYSTEM-level compromise, allowing attackers to bypass security controls, install persistent malware, steal sensitive data, or disrupt system operations. This can impact confidentiality by exposing sensitive information, integrity by allowing unauthorized modifications to system files, and availability by potentially causing system instability or denial of service. Organizations in sectors with high regulatory requirements such as finance, healthcare, and critical infrastructure could face severe compliance and operational consequences. The vulnerability is particularly concerning in multi-user environments where non-admin users have local access, such as corporate desktops or shared workstations. Given the widespread use of Malwarebytes products in Europe, the threat surface is considerable.
Mitigation Recommendations
1. Upgrade Malwarebytes AdwCleaner to version 8.7.0 or later where this vulnerability is fixed. 2. Until patching is possible, restrict local user permissions to prevent unauthorized file creation in the folders targeted by AdwCleaner’s log deletion process. 3. Implement application whitelisting and endpoint protection to detect and block suspicious symbolic link creation or manipulation. 4. Monitor file system activity for unusual symlink creation or deletion operations in directories used by AdwCleaner. 5. Use Group Policy or endpoint management tools to enforce least privilege principles and limit administrative rights on endpoints. 6. Educate users about the risks of local privilege escalation and enforce strict access controls on shared machines. 7. Regularly audit installed software versions and patch management processes to ensure timely updates of security-critical applications.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699575bb80d747be20537726
Added to database: 2/18/2026, 8:18:03 AM
Last enriched: 2/18/2026, 8:22:59 AM
Last updated: 2/21/2026, 12:16:02 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.