CVE-2025-50505
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-07

Last updated on: 2025-10-08

Assigner: MITRE

Description
Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-07
Last Modified
2025-10-08
Generated
2026-05-07
AI Q&A
2025-10-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
clash_verge clash_verge 2.2.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-250 The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Clash Verge Rev through 2.2.3 involves the forced installation of a system service called clash-verge-service, which exposes key functions via an unauthorized HTTP API endpoint `/start_clash`. Local users can submit arbitrary bin_path parameters to this API, which are then executed by the service process. This allows local users to escalate their privileges on the system.


How can this vulnerability impact me? :

The vulnerability can allow local users to execute arbitrary code with elevated privileges by exploiting the unauthorized HTTP API. This local privilege escalation can lead to unauthorized access to sensitive system functions, potentially compromising the entire system's security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart