Home

Description

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.1 and below, a critical security vulnerability exists in password handling mechanisms. During encrypted sandbox creation, user passwords are transmitted via shared memory, exposing them to potential interception. The vulnerability is particularly severe during password modification operations, where both old and new passwords are passed as plaintext command-line arguments to the Imbox process without any encryption or obfuscation. This implementation flaw allows any process within the user session, including unprivileged processes, to retrieve these sensitive credentials by reading the command-line arguments, thereby bypassing standard privilege requirements and creating a significant security risk. This is fixed in version 1.16.2.

PUBLISHED Reserved 2025-07-21 | Published 2025-07-29 | Updated 2025-07-29 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-312: Cleartext Storage of Sensitive Information

CWE-322: Key Exchange without Entity Authentication

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

CWE-522: Insufficiently Protected Credentials

Product status

< 1.16.2
affected

References

github.com/...dboxie/security/advisories/GHSA-jp7r-vgv9-43p7 exploit

github.com/...dboxie/security/advisories/GHSA-jp7r-vgv9-43p7

github.com/...ommit/d107d5743880da28e782c1771b5246b2a512989a

github.com/sandboxie-plus/Sandboxie/releases/tag/v1.16.2

cve.org (CVE-2025-54422)

nvd.nist.gov (CVE-2025-54422)

Download JSON