CVE-2025-50505
BaseFortify
Publication date: 2025-10-07
Last updated on: 2025-10-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| clash_verge | clash_verge | 2.2.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-250 | The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Clash Verge Rev through 2.2.3 involves the forced installation of a system service called clash-verge-service, which exposes key functions via an unauthorized HTTP API endpoint `/start_clash`. Local users can submit arbitrary bin_path parameters to this API, which are then executed by the service process. This allows local users to escalate their privileges on the system.
How can this vulnerability impact me? :
The vulnerability can allow local users to execute arbitrary code with elevated privileges by exploiting the unauthorized HTTP API. This local privilege escalation can lead to unauthorized access to sensitive system functions, potentially compromising the entire system's security.