Description
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
2.10.1 (custom) before 2.18.3-alpha
2.10.1 (custom) before 2.18.8
2.18.3-alpha
2.18.8
Credits
HackingByDoing
References
github.com/Windscribe/Desktop-App (url)
github.com/...p-App/compare/v2.18.2...v2.18.3?diff=unified&w (url)
github.com/...p-App/compare/v2.18.2...v2.18.3?diff=unified&w (url)
hackingbydoing.wixsite.com/...vpn-local-privilege-escalation (url)
www.cve.org/CVERecord?id=CVE-2025-65199 (url)
raw.githubusercontent.com/...IT/white/2025/va-25-343-01.json (url)