Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-250 | |
Metrics |
cvssV3_1
|
Tue, 07 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Clash Verge Rev thru 2.2.3 forces the installation of system services(clash-verge-service) by default and exposes key functions through the unauthorized HTTP API `/start_clash`, allowing local users to submit arbitrary bin_path parameters and pass them directly to the service process for execution, resulting in local privilege escalation. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-08T13:36:44.282Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50505

Updated: 2025-10-08T13:36:34.325Z

Status : Awaiting Analysis
Published: 2025-10-07T14:15:37.120
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-50505

No data.

No data.