Home

Description

VX Search 13.5.28 contains an unquoted service path vulnerability in both VX Search Server and VX Search Enterprise services that allows local attackers to escalate privileges. Attackers can place malicious executables in unquoted path directories like C:\Program Files\VX Search to execute arbitrary code with LocalSystem privileges when services restart.

PUBLISHED Reserved 2026-05-16 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unquoted Search Path or Element

Product status

13.5.28
affected

Credits

Brian Rodriguez finder

References

www.exploit-db.com/exploits/50026 (ExploitDB-50026) exploit

www.vxsearch.com (Official Product Homepage) product

www.vulncheck.com/...uoted-service-path-privilege-escalation (VulnCheck Advisory: VX Search 13.5.28 Unquoted Service Path Privilege Escalation) third-party-advisory

cve.org (CVE-2021-47974)

nvd.nist.gov (CVE-2021-47974)

Download JSON