CVE-2025-65199
Severity CVSS v4.0:
HIGH
Type:
CWE-78
OS Command Injections
Publication date:
10/12/2025
Last modified:
10/12/2025
Description
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.
Impact
Base Score 4.0
7.30
Severity 4.0
HIGH
Base Score 3.x
7.80
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/Windscribe/Desktop-App
- https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w=#diff-57e27ab201a1a612609087b839e03bf87a5a063ffcc3f465a6245469bc102754
- https://github.com/Windscribe/Desktop-App/compare/v2.18.2...v2.18.3?diff=unified&w=#diff-cfc5df17057ed92112ae70a42c81c57c79f434429210ff881fb0771cf8e39b4c
- https://hackingbydoing.wixsite.com/hackingbydoing/post/windscribe-vpn-local-privilege-escalation
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-343-01.json
- https://www.cve.org/CVERecord?id=CVE-2025-65199



