Impact
Sandboxie version 5.30 contains a buffer overflow in the Program Alerts configuration that can be triggered by entering an overly long string, such as 5,000 characters, into the "Select or enter a program" field. This vulnerability is a classic memory corruption flaw (CWE-1282 and CWE-1284) and results only in a crash of the application, providing no data disclosure or execution capabilities.
Affected Systems
The vulnerability affects installations of Sandboxie version 5.30 on Windows, including both the standard and classic editions as indicated by the provided CPE data.
Risk and Exploitability
The CVSS score of 6.9 places the flaw in the medium‑high range, but the EPSS score of less than 1% suggests that widespread exploitation is unlikely. Attackers must be able to manipulate the Program Alerts UI locally, so the attack vector is inferred to be local. The vulnerability is not listed in the CISA KEV catalog, and no public exploits have been reported, limiting its risk mainly to interruption of the sandbox service by authorized or disgruntled users.
OpenCVE Enrichment