We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-40672

Privilege Escalation in Panloader.exe



Description

A Privilege Escalation vulnerability has been found in Panloader component v3.24.0.0 by Espiral MS Group. This vulnerability allows any user to override the file panLoad.exe that will be executed by SYSTEM user via a programmed task. This would allow an attacker to obtain administrator permissions to perform whatever activities he/she wants, shuch as accessing sensitive information, executing code remotely, and even causing a denial of service (DoS).

Reserved 2025-04-16 | Published 2025-05-26 | Updated 2025-05-27 | Assigner INCIBE


HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-732 Incorrect Permission Assignment for Critical Resource

Product status

Default status
unaffected

3.24.0.0
affected

Credits

Pablo Arriaga Perez finder

References

www.incibe.es/...ge-escalation-proactivanet-espiral-ms-group

cve.org (CVE-2025-40672)

nvd.nist.gov (CVE-2025-40672)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-40672

Support options

Helpdesk Chat, Email, Knowledgebase